2021-12-05 00:50:14 +00:00
---
hide:
- toc
---
2021-12-05 23:17:30 +00:00
# Security Overview
2021-12-04 20:11:45 +00:00
2021-12-05 00:50:14 +00:00
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
2021-12-04 20:11:45 +00:00
## Helm-Chart
##### Scan Results
2022-02-22 10:34:01 +00:00
#### Chart Object: lychee/charts/postgresql/templates/common.yaml
2021-12-04 20:34:35 +00:00
2021-12-04 20:11:45 +00:00
2021-12-04 20:34:35 +00:00
2022-02-22 10:34:01 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' RELEASE-NAME-postgresql' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-postgresql' of StatefulSet ' RELEASE-NAME-postgresql' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-postgresql' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv017" > https://avd.aquasec.com/misconfig/ksv017< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-postgresql' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-postgresql' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-postgresql' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
2022-02-22 10:34:01 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' RELEASE-NAME-redis' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-redis' of StatefulSet ' RELEASE-NAME-redis' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-redis' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv017" > https://avd.aquasec.com/misconfig/ksv017< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-redis' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-redis' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of StatefulSet ' RELEASE-NAME-redis' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
2022-02-22 10:34:01 +00:00
2021-12-05 00:50:14 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' RELEASE-NAME-lychee' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-lychee' of Deployment ' RELEASE-NAME-lychee' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-lychee' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-lychee' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv017" > https://avd.aquasec.com/misconfig/ksv017< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-lychee' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-lychee' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-lychee' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
2021-12-04 20:11:45 +00:00
## Containers
##### Detected Containers
2022-07-04 22:32:57 +00:00
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
2022-06-23 02:09:03 +00:00
tccr.io/truecharts/lychee-laravel:v4.4.0@sha256:f241d62fa4b2f97577d494c319eaab9e5b127e4a67af58ea90861ce56ff0fb88
2022-07-04 22:32:57 +00:00
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
2022-07-05 20:53:58 +00:00
tccr.io/truecharts/postgresql:v14.4.0@sha256:16f1954b5e3ca05d163c5d3c6edda0ec4e687cdd524133241df639f4423946dc
2022-07-04 22:32:57 +00:00
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
tccr.io/truecharts/redis:v7.0.2@sha256:6fdca1a975247a29f5ed76752f99e880f0052672347b575c387e406fff09e3c8
2021-12-04 20:11:45 +00:00
##### Scan Results
2022-07-04 22:32:57 +00:00
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
2022-06-21 09:20:23 +00:00
2022-02-22 10:34:01 +00:00
2022-07-04 22:32:57 +00:00
**ubuntu**
2022-02-22 10:34:01 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-07-04 22:32:57 +00:00
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43618" > https://access.redhat.com/security/cve/CVE-2021-43618< / a > < br > < a href = "https://bugs.debian.org/994405" > https://bugs.debian.org/994405< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618< / a > < br > < a href = "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" > https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html< / a > < br > < a href = "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" > https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43618" > https://nvd.nist.gov/vuln/detail/CVE-2021-43618< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1586" > https://access.redhat.com/security/cve/CVE-2022-1586< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077976," > https://bugzilla.redhat.com/show_bug.cgi?id=2077976,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a," > https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c" > https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1586.html" > https://linux.oracle.com/cve/CVE-2022-1586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1586" > https://nvd.nist.gov/vuln/detail/CVE-2022-1586< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1587" > https://access.redhat.com/security/cve/CVE-2022-1587< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077983," > https://bugzilla.redhat.com/show_bug.cgi?id=2077983,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0" > https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1587.html" > https://linux.oracle.com/cve/CVE-2022-1587.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1587" > https://nvd.nist.gov/vuln/detail/CVE-2022-1587< / a > < br > < / details > |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/HT211168" > https://support.apple.com/HT211168< / a > < br > < a href = "https://support.apple.com/HT211170" > https://support.apple.com/HT211170< / a > < br > < a href = "https://support.apple.com/HT211171" > https://support.apple.com/HT211171< / a > < br > < a href = "https://support.apple.com/HT211175" > https://support.apple.com/HT211175< / a > < br > < a href = "https://support.apple.com/HT211178" > https://support.apple.com/HT211178< / a > < br > < a href = "https://support.apple.com/HT211179" > https://support.apple.com/HT211179< / a > < br > < a href = "https://support.apple.com/HT211181" > https://support.apple.com/HT211181< / a > < br > < a href = "https://vuldb.com/?id.155768" > https://vuldb.com/?id.155768< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/en-us/HT211935" > https://support.apple.com/en-us/HT211935< / a > < br > < a href = "https://support.apple.com/en-us/HT211952" > https://support.apple.com/en-us/HT211952< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211847" > https://support.apple.com/en-us/HT211847< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211846" > https://support.apple.com/kb/HT211846< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/< / a > < br > < / details > |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| libssl1.1 | CVE-2022-2097 | MEDIUM | 1.1.1f-1ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| openssl | CVE-2022-2097 | MEDIUM | 1.1.1f-1ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-31879" > https://access.redhat.com/security/cve/CVE-2021-31879< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879< / a > < br > < a href = "https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html" > https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-31879" > https://nvd.nist.gov/vuln/detail/CVE-2021-31879< / a > < br > < a href = "https://savannah.gnu.org/bugs/?56909" > https://savannah.gnu.org/bugs/?56909< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210618-0002/" > https://security.netapp.com/advisory/ntap-20210618-0002/< / a > < br > < / details > |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
2022-02-22 10:34:01 +00:00
2022-06-23 02:09:03 +00:00
#### Container: tccr.io/truecharts/lychee-laravel:v4.4.0@sha256:f241d62fa4b2f97577d494c319eaab9e5b127e4a67af58ea90861ce56ff0fb88 (debian bookworm/sid)
**debian**
| No Vulnerabilities found |
|:---------------------------------|
**composer**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-07-04 22:32:57 +00:00
| guzzlehttp/guzzle | CVE-2022-29248 | HIGH | 7.4.0 | 7.4.3, 6.5.6 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-cwmx-hcrq-mhc3" > https://github.com/advisories/GHSA-cwmx-hcrq-mhc3< / a > < br > < a href = "https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab" > https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab< / a > < br > < a href = "https://github.com/guzzle/guzzle/pull/3018" > https://github.com/guzzle/guzzle/pull/3018< / a > < br > < a href = "https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3" > https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29248" > https://nvd.nist.gov/vuln/detail/CVE-2022-29248< / a > < br > < a href = "https://www.drupal.org/sa-core-2022-010" > https://www.drupal.org/sa-core-2022-010< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| guzzlehttp/guzzle | CVE-2022-31042 | HIGH | 7.4.0 | 7.4.4, 6.5.7 | < details > < summary > Expand...< / summary > < a href = "https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml" > https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml< / a > < br > < a href = "https://github.com/advisories/GHSA-f2wf-25xc-69c9" > https://github.com/advisories/GHSA-f2wf-25xc-69c9< / a > < br > < a href = "https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8" > https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8< / a > < br > < a href = "https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9" > https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-31042" > https://nvd.nist.gov/vuln/detail/CVE-2022-31042< / a > < br > < a href = "https://www.drupal.org/sa-core-2022-011" > https://www.drupal.org/sa-core-2022-011< / a > < br > < a href = "https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx" > https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx< / a > < br > < / details > |
| guzzlehttp/guzzle | CVE-2022-31043 | HIGH | 7.4.0 | 7.4.4, 6.5.7 | < details > < summary > Expand...< / summary > < a href = "https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml" > https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml< / a > < br > < a href = "https://github.com/advisories/GHSA-w248-ffj2-4v5q" > https://github.com/advisories/GHSA-w248-ffj2-4v5q< / a > < br > < a href = "https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8" > https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8< / a > < br > < a href = "https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q" > https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-31043" > https://nvd.nist.gov/vuln/detail/CVE-2022-31043< / a > < br > < a href = "https://www.drupal.org/sa-core-2022-011" > https://www.drupal.org/sa-core-2022-011< / a > < br > < a href = "https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx" > https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| guzzlehttp/guzzle | CVE-2022-31090 | HIGH | 7.4.0 | 7.4.5, 6.5.8 | < details > < summary > Expand...< / summary > < a href = "https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml" > https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml< / a > < br > < a href = "https://github.com/advisories/GHSA-25mq-v84q-4j7r" > https://github.com/advisories/GHSA-25mq-v84q-4j7r< / a > < br > < a href = "https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md" > https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md< / a > < br > < a href = "https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md" > https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md< / a > < br > < a href = "https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82" > https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82< / a > < br > < a href = "https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r" > https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-31090" > https://nvd.nist.gov/vuln/detail/CVE-2022-31090< / a > < br > < / details > |
| guzzlehttp/guzzle | CVE-2022-31091 | HIGH | 7.4.0 | 7.4.5, 6.5.8 | < details > < summary > Expand...< / summary > < a href = "https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml" > https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml< / a > < br > < a href = "https://github.com/advisories/GHSA-q559-8m2m-g699" > https://github.com/advisories/GHSA-q559-8m2m-g699< / a > < br > < a href = "https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82" > https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82< / a > < br > < a href = "https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699" > https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-31091" > https://nvd.nist.gov/vuln/detail/CVE-2022-31091< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| guzzlehttp/psr7 | CVE-2022-24775 | HIGH | 2.1.0 | 2.1.1, 1.8.4 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-q7rv-6hp3-vh96" > https://github.com/advisories/GHSA-q7rv-6hp3-vh96< / a > < br > < a href = "https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1" > https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1< / a > < br > < a href = "https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc" > https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc< / a > < br > < a href = "https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96" > https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24775" > https://nvd.nist.gov/vuln/detail/CVE-2022-24775< / a > < br > < a href = "https://www.drupal.org/sa-core-2022-006" > https://www.drupal.org/sa-core-2022-006< / a > < br > < / details > |
| laravel/framework | CVE-2021-43808 | MEDIUM | v8.74.0 | 6.20.42, 7.30.6, 8.75.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-66hf-2p6w-jqfw" > https://github.com/advisories/GHSA-66hf-2p6w-jqfw< / a > < br > < a href = "https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b" > https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b< / a > < br > < a href = "https://github.com/laravel/framework/pull/39906" > https://github.com/laravel/framework/pull/39906< / a > < br > < a href = "https://github.com/laravel/framework/pull/39908" > https://github.com/laravel/framework/pull/39908< / a > < br > < a href = "https://github.com/laravel/framework/pull/39909" > https://github.com/laravel/framework/pull/39909< / a > < br > < a href = "https://github.com/laravel/framework/releases/tag/v6.20.42" > https://github.com/laravel/framework/releases/tag/v6.20.42< / a > < br > < a href = "https://github.com/laravel/framework/releases/tag/v7.30.6" > https://github.com/laravel/framework/releases/tag/v7.30.6< / a > < br > < a href = "https://github.com/laravel/framework/releases/tag/v8.75.0" > https://github.com/laravel/framework/releases/tag/v8.75.0< / a > < br > < a href = "https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw" > https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
2022-02-22 10:34:01 +00:00
2022-07-04 22:32:57 +00:00
**ubuntu**
2022-06-21 09:20:23 +00:00
2022-07-04 22:32:57 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43618" > https://access.redhat.com/security/cve/CVE-2021-43618< / a > < br > < a href = "https://bugs.debian.org/994405" > https://bugs.debian.org/994405< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618< / a > < br > < a href = "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" > https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html< / a > < br > < a href = "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" > https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43618" > https://nvd.nist.gov/vuln/detail/CVE-2021-43618< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1586" > https://access.redhat.com/security/cve/CVE-2022-1586< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077976," > https://bugzilla.redhat.com/show_bug.cgi?id=2077976,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a," > https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c" > https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1586.html" > https://linux.oracle.com/cve/CVE-2022-1586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1586" > https://nvd.nist.gov/vuln/detail/CVE-2022-1586< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1587" > https://access.redhat.com/security/cve/CVE-2022-1587< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077983," > https://bugzilla.redhat.com/show_bug.cgi?id=2077983,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0" > https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1587.html" > https://linux.oracle.com/cve/CVE-2022-1587.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1587" > https://nvd.nist.gov/vuln/detail/CVE-2022-1587< / a > < br > < / details > |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/HT211168" > https://support.apple.com/HT211168< / a > < br > < a href = "https://support.apple.com/HT211170" > https://support.apple.com/HT211170< / a > < br > < a href = "https://support.apple.com/HT211171" > https://support.apple.com/HT211171< / a > < br > < a href = "https://support.apple.com/HT211175" > https://support.apple.com/HT211175< / a > < br > < a href = "https://support.apple.com/HT211178" > https://support.apple.com/HT211178< / a > < br > < a href = "https://support.apple.com/HT211179" > https://support.apple.com/HT211179< / a > < br > < a href = "https://support.apple.com/HT211181" > https://support.apple.com/HT211181< / a > < br > < a href = "https://vuldb.com/?id.155768" > https://vuldb.com/?id.155768< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/en-us/HT211935" > https://support.apple.com/en-us/HT211935< / a > < br > < a href = "https://support.apple.com/en-us/HT211952" > https://support.apple.com/en-us/HT211952< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211847" > https://support.apple.com/en-us/HT211847< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211846" > https://support.apple.com/kb/HT211846< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/< / a > < br > < / details > |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| libssl1.1 | CVE-2022-2097 | MEDIUM | 1.1.1f-1ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| openssl | CVE-2022-2097 | MEDIUM | 1.1.1f-1ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-31879" > https://access.redhat.com/security/cve/CVE-2021-31879< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879< / a > < br > < a href = "https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html" > https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-31879" > https://nvd.nist.gov/vuln/detail/CVE-2021-31879< / a > < br > < a href = "https://savannah.gnu.org/bugs/?56909" > https://savannah.gnu.org/bugs/?56909< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210618-0002/" > https://security.netapp.com/advisory/ntap-20210618-0002/< / a > < br > < / details > |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
#### Container: tccr.io/truecharts/postgresql:v14.4.0@sha256:16f1954b5e3ca05d163c5d3c6edda0ec4e687cdd524133241df639f4423946dc (debian 11.3)
2022-02-22 10:34:01 +00:00
**debian**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-06-11 19:16:07 +00:00
| apt | CVE-2011-3374 | LOW | 2.2.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2011-3374" > https://access.redhat.com/security/cve/cve-2011-3374< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480< / a > < br > < a href = "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html" > https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html< / a > < br > < a href = "https://seclists.org/fulldisclosure/2011/Sep/221" > https://seclists.org/fulldisclosure/2011/Sep/221< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2011-3374" > https://security-tracker.debian.org/tracker/CVE-2011-3374< / a > < br > < a href = "https://snyk.io/vuln/SNYK-LINUX-APT-116518" > https://snyk.io/vuln/SNYK-LINUX-APT-116518< / a > < br > < a href = "https://ubuntu.com/security/CVE-2011-3374" > https://ubuntu.com/security/CVE-2011-3374< / a > < br > < / details > |
| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| coreutils | CVE-2016-2781 | LOW | 8.32-4 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| coreutils | CVE-2017-18018 | LOW | 8.32-4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html" > http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-18018" > https://access.redhat.com/security/cve/CVE-2017-18018< / a > < br > < / details > |
| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22945" > https://access.redhat.com/security/cve/CVE-2021-22945< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22945.html" > https://curl.se/docs/CVE-2021-22945.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945< / a > < br > < a href = "https://hackerone.com/reports/1269242" > https://hackerone.com/reports/1269242< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" > https://nvd.nist.gov/vuln/detail/CVE-2021-22945< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22946" > https://access.redhat.com/security/cve/CVE-2021-22946< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22946.html" > https://curl.se/docs/CVE-2021-22946.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946< / a > < br > < a href = "https://hackerone.com/reports/1334111" > https://hackerone.com/reports/1334111< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22946.html" > https://linux.oracle.com/cve/CVE-2021-22946.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" > https://nvd.nist.gov/vuln/detail/CVE-2021-22946< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0008/" > https://security.netapp.com/advisory/ntap-20220121-0008/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://hackerone.com/reports/1526328" > https://hackerone.com/reports/1526328< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22576.html" > https://linux.oracle.com/cve/CVE-2022-22576.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22576" > https://nvd.nist.gov/vuln/detail/CVE-2022-22576< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-06-14 19:10:22 +00:00
| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://hackerone.com/reports/1546268" > https://hackerone.com/reports/1546268< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27775" > https://nvd.nist.gov/vuln/detail/CVE-2022-27775< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27781" > https://access.redhat.com/security/cve/CVE-2022-27781< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27781.html" > https://curl.se/docs/CVE-2022-27781.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781< / a > < br > < a href = "https://github.com/curl/curl/commit/f6c335d63f" > https://github.com/curl/curl/commit/f6c335d63f< / a > < br > < a href = "https://hackerone.com/reports/1555441" > https://hackerone.com/reports/1555441< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27781" > https://nvd.nist.gov/vuln/detail/CVE-2022-27781< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27782" > https://access.redhat.com/security/cve/CVE-2022-27782< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27782.html" > https://curl.se/docs/CVE-2022-27782.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782< / a > < br > < a href = "https://hackerone.com/reports/1555796" > https://hackerone.com/reports/1555796< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27782.html" > https://linux.oracle.com/cve/CVE-2022-27782.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27782" > https://nvd.nist.gov/vuln/detail/CVE-2022-27782< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22947" > https://access.redhat.com/security/cve/CVE-2021-22947< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22947.html" > https://curl.se/docs/CVE-2021-22947.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947< / a > < br > < a href = "https://hackerone.com/reports/1334763" > https://hackerone.com/reports/1334763< / a > < br > < a href = "https://launchpad.net/bugs/1944120 (regression bug)" > https://launchpad.net/bugs/1944120 (regression bug)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22947.html" > https://linux.oracle.com/cve/CVE-2021-22947.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" > https://nvd.nist.gov/vuln/detail/CVE-2021-22947< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-3" > https://ubuntu.com/security/notices/USN-5079-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-4" > https://ubuntu.com/security/notices/USN-5079-4< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://hackerone.com/reports/1543773" > https://hackerone.com/reports/1543773< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27774.html" > https://linux.oracle.com/cve/CVE-2022-27774.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27774" > https://nvd.nist.gov/vuln/detail/CVE-2022-27774< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://hackerone.com/reports/1547048" > https://hackerone.com/reports/1547048< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27776.html" > https://linux.oracle.com/cve/CVE-2022-27776.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27776" > https://nvd.nist.gov/vuln/detail/CVE-2022-27776< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-32205 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32205" > https://access.redhat.com/security/cve/CVE-2022-32205< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32205.html" > https://curl.se/docs/CVE-2022-32205.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32206 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32207 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32207" > https://access.redhat.com/security/cve/CVE-2022-32207< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32207.html" > https://curl.se/docs/CVE-2022-32207.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32208 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/07/21/4" > http://www.openwall.com/lists/oss-security/2021/07/21/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22898" > https://access.redhat.com/security/cve/CVE-2021-22898< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22898.html" > https://curl.se/docs/CVE-2021-22898.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4511.html" > https://errata.almalinux.org/8/ALSA-2021-4511.html< / a > < br > < a href = "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde" > https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde< / a > < br > < a href = "https://hackerone.com/reports/1176461" > https://hackerone.com/reports/1176461< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22898.html" > https://linux.oracle.com/cve/CVE-2021-22898.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4511.html" > https://linux.oracle.com/errata/ELSA-2021-4511.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" > https://nvd.nist.gov/vuln/detail/CVE-2021-22898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-2" > https://ubuntu.com/security/notices/USN-5021-2< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22922" > https://access.redhat.com/security/cve/CVE-2021-22922< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22922.html" > https://curl.se/docs/CVE-2021-22922.html< / a > < br > < a href = "https://hackerone.com/reports/1213175" > https://hackerone.com/reports/1213175< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22922.html" > https://linux.oracle.com/cve/CVE-2021-22922.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" > https://nvd.nist.gov/vuln/detail/CVE-2021-22922< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22923" > https://access.redhat.com/security/cve/CVE-2021-22923< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22923.html" > https://curl.se/docs/CVE-2021-22923.html< / a > < br > < a href = "https://hackerone.com/reports/1213181" > https://hackerone.com/reports/1213181< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22923.html" > https://linux.oracle.com/cve/CVE-2021-22923.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" > https://nvd.nist.gov/vuln/detail/CVE-2021-22923< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-06-14 19:10:22 +00:00
| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22924" > https://access.redhat.com/security/cve/CVE-2021-22924< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22924.html" > https://curl.se/docs/CVE-2021-22924.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924< / a > < br > < a href = "https://hackerone.com/reports/1223565" > https://hackerone.com/reports/1223565< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22924.html" > https://linux.oracle.com/cve/CVE-2021-22924.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" > https://nvd.nist.gov/vuln/detail/CVE-2021-22924< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2011-3374" > https://access.redhat.com/security/cve/cve-2011-3374< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480< / a > < br > < a href = "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html" > https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html< / a > < br > < a href = "https://seclists.org/fulldisclosure/2011/Sep/221" > https://seclists.org/fulldisclosure/2011/Sep/221< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2011-3374" > https://security-tracker.debian.org/tracker/CVE-2011-3374< / a > < br > < a href = "https://snyk.io/vuln/SNYK-LINUX-APT-116518" > https://snyk.io/vuln/SNYK-LINUX-APT-116518< / a > < br > < a href = "https://ubuntu.com/security/CVE-2011-3374" > https://ubuntu.com/security/CVE-2011-3374< / a > < br > < / details > |
| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc-l10n | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc-l10n | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
| libc-l10n | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc-l10n | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc-l10n | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc-l10n | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc-l10n | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc-l10n | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22945" > https://access.redhat.com/security/cve/CVE-2021-22945< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22945.html" > https://curl.se/docs/CVE-2021-22945.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945< / a > < br > < a href = "https://hackerone.com/reports/1269242" > https://hackerone.com/reports/1269242< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" > https://nvd.nist.gov/vuln/detail/CVE-2021-22945< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22946" > https://access.redhat.com/security/cve/CVE-2021-22946< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22946.html" > https://curl.se/docs/CVE-2021-22946.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946< / a > < br > < a href = "https://hackerone.com/reports/1334111" > https://hackerone.com/reports/1334111< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22946.html" > https://linux.oracle.com/cve/CVE-2021-22946.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" > https://nvd.nist.gov/vuln/detail/CVE-2021-22946< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0008/" > https://security.netapp.com/advisory/ntap-20220121-0008/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://hackerone.com/reports/1526328" > https://hackerone.com/reports/1526328< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22576.html" > https://linux.oracle.com/cve/CVE-2022-22576.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22576" > https://nvd.nist.gov/vuln/detail/CVE-2022-22576< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-06-14 19:10:22 +00:00
| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://hackerone.com/reports/1546268" > https://hackerone.com/reports/1546268< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27775" > https://nvd.nist.gov/vuln/detail/CVE-2022-27775< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27781" > https://access.redhat.com/security/cve/CVE-2022-27781< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27781.html" > https://curl.se/docs/CVE-2022-27781.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781< / a > < br > < a href = "https://github.com/curl/curl/commit/f6c335d63f" > https://github.com/curl/curl/commit/f6c335d63f< / a > < br > < a href = "https://hackerone.com/reports/1555441" > https://hackerone.com/reports/1555441< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27781" > https://nvd.nist.gov/vuln/detail/CVE-2022-27781< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27782" > https://access.redhat.com/security/cve/CVE-2022-27782< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27782.html" > https://curl.se/docs/CVE-2022-27782.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782< / a > < br > < a href = "https://hackerone.com/reports/1555796" > https://hackerone.com/reports/1555796< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27782.html" > https://linux.oracle.com/cve/CVE-2022-27782.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27782" > https://nvd.nist.gov/vuln/detail/CVE-2022-27782< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22947" > https://access.redhat.com/security/cve/CVE-2021-22947< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22947.html" > https://curl.se/docs/CVE-2021-22947.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947< / a > < br > < a href = "https://hackerone.com/reports/1334763" > https://hackerone.com/reports/1334763< / a > < br > < a href = "https://launchpad.net/bugs/1944120 (regression bug)" > https://launchpad.net/bugs/1944120 (regression bug)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22947.html" > https://linux.oracle.com/cve/CVE-2021-22947.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" > https://nvd.nist.gov/vuln/detail/CVE-2021-22947< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-3" > https://ubuntu.com/security/notices/USN-5079-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-4" > https://ubuntu.com/security/notices/USN-5079-4< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://hackerone.com/reports/1543773" > https://hackerone.com/reports/1543773< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27774.html" > https://linux.oracle.com/cve/CVE-2022-27774.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27774" > https://nvd.nist.gov/vuln/detail/CVE-2022-27774< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://hackerone.com/reports/1547048" > https://hackerone.com/reports/1547048< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27776.html" > https://linux.oracle.com/cve/CVE-2022-27776.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27776" > https://nvd.nist.gov/vuln/detail/CVE-2022-27776< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32205 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32205" > https://access.redhat.com/security/cve/CVE-2022-32205< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32205.html" > https://curl.se/docs/CVE-2022-32205.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32207 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32207" > https://access.redhat.com/security/cve/CVE-2022-32207< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32207.html" > https://curl.se/docs/CVE-2022-32207.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/07/21/4" > http://www.openwall.com/lists/oss-security/2021/07/21/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22898" > https://access.redhat.com/security/cve/CVE-2021-22898< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22898.html" > https://curl.se/docs/CVE-2021-22898.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4511.html" > https://errata.almalinux.org/8/ALSA-2021-4511.html< / a > < br > < a href = "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde" > https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde< / a > < br > < a href = "https://hackerone.com/reports/1176461" > https://hackerone.com/reports/1176461< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22898.html" > https://linux.oracle.com/cve/CVE-2021-22898.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4511.html" > https://linux.oracle.com/errata/ELSA-2021-4511.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" > https://nvd.nist.gov/vuln/detail/CVE-2021-22898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-2" > https://ubuntu.com/security/notices/USN-5021-2< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22922" > https://access.redhat.com/security/cve/CVE-2021-22922< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22922.html" > https://curl.se/docs/CVE-2021-22922.html< / a > < br > < a href = "https://hackerone.com/reports/1213175" > https://hackerone.com/reports/1213175< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22922.html" > https://linux.oracle.com/cve/CVE-2021-22922.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" > https://nvd.nist.gov/vuln/detail/CVE-2021-22922< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22923" > https://access.redhat.com/security/cve/CVE-2021-22923< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22923.html" > https://curl.se/docs/CVE-2021-22923.html< / a > < br > < a href = "https://hackerone.com/reports/1213181" > https://hackerone.com/reports/1213181< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22923.html" > https://linux.oracle.com/cve/CVE-2021-22923.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" > https://nvd.nist.gov/vuln/detail/CVE-2021-22923< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-06-14 19:10:22 +00:00
| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22924" > https://access.redhat.com/security/cve/CVE-2021-22924< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22924.html" > https://curl.se/docs/CVE-2021-22924.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924< / a > < br > < a href = "https://hackerone.com/reports/1223565" > https://hackerone.com/reports/1223565< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22924.html" > https://linux.oracle.com/cve/CVE-2021-22924.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" > https://nvd.nist.gov/vuln/detail/CVE-2021-22924< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-8457" > https://access.redhat.com/security/cve/CVE-2019-8457< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-8457.html" > https://linux.oracle.com/cve/CVE-2019-8457.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1810.html" > https://linux.oracle.com/errata/ELSA-2020-1810.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190606-0002/" > https://security.netapp.com/advisory/ntap-20190606-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4004-1" > https://ubuntu.com/security/notices/USN-4004-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4004-2" > https://ubuntu.com/security/notices/USN-4004-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4019-1" > https://ubuntu.com/security/notices/USN-4019-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4019-2" > https://ubuntu.com/security/notices/USN-4019-2< / a > < br > < a href = "https://usn.ubuntu.com/4004-1/" > https://usn.ubuntu.com/4004-1/< / a > < br > < a href = "https://usn.ubuntu.com/4004-2/" > https://usn.ubuntu.com/4004-2/< / a > < br > < a href = "https://usn.ubuntu.com/4019-1/" > https://usn.ubuntu.com/4019-1/< / a > < br > < a href = "https://usn.ubuntu.com/4019-2/" > https://usn.ubuntu.com/4019-2/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2020.html" > https://www.oracle.com/security-alerts/cpujan2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < a href = "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" > https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html< / a > < br > < a href = "https://www.sqlite.org/releaselog/3_28_0.html" > https://www.sqlite.org/releaselog/3_28_0.html< / a > < br > < a href = "https://www.sqlite.org/src/info/90acdbfce9c08858" > https://www.sqlite.org/src/info/90acdbfce9c08858< / a > < br > < / details > |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-33560" > https://access.redhat.com/security/cve/CVE-2021-33560< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560< / a > < br > < a href = "https://dev.gnupg.org/T5305" > https://dev.gnupg.org/T5305< / a > < br > < a href = "https://dev.gnupg.org/T5328" > https://dev.gnupg.org/T5328< / a > < br > < a href = "https://dev.gnupg.org/T5466" > https://dev.gnupg.org/T5466< / a > < br > < a href = "https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61" > https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61< / a > < br > < a href = "https://eprint.iacr.org/2021/923" > https://eprint.iacr.org/2021/923< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4409.html" > https://errata.almalinux.org/8/ALSA-2021-4409.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33560.html" > https://linux.oracle.com/cve/CVE-2021-33560.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9263.html" > https://linux.oracle.com/errata/ELSA-2022-9263.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33560" > https://nvd.nist.gov/vuln/detail/CVE-2021-33560< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5080-1" > https://ubuntu.com/security/notices/USN-5080-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5080-2" > https://ubuntu.com/security/notices/USN-5080-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-6829" > https://access.redhat.com/security/cve/CVE-2018-6829< / a > < br > < a href = "https://github.com/weikengchen/attack-on-libgcrypt-elgamal" > https://github.com/weikengchen/attack-on-libgcrypt-elgamal< / a > < br > < a href = "https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki" > https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html" > https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2020.html" > https://www.oracle.com/security-alerts/cpujan2020.html< / a > < br > < / details > |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-4209" > https://access.redhat.com/security/cve/CVE-2021-4209< / a > < br > < / details > |
| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | | < details > < summary > Expand...< / summary > < a href = "http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/" > http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/< / a > < br > < a href = "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" > http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/< / a > < br > < a href = "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" > http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx< / a > < br > < a href = "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" > http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx< / a > < br > < a href = "http://curl.haxx.se/docs/adv_20120124B.html" > http://curl.haxx.se/docs/adv_20120124B.html< / a > < br > < a href = "http://downloads.asterisk.org/pub/security/AST-2016-001.html" > http://downloads.asterisk.org/pub/security/AST-2016-001.html< / a > < br > < a href = "http://ekoparty.org/2011/juliano-rizzo.php" > http://ekoparty.org/2011/juliano-rizzo.php< / a > < br > < a href = "http://eprint.iacr.org/2004/111" > http://eprint.iacr.org/2004/111< / a > < br > < a href = "http://eprint.iacr.org/2006/136" > http://eprint.iacr.org/2006/136< / a > < br > < a href = "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" > http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html< / a > < br > < a href = "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" > http://isc.sans.edu/diary/SSL+TLS+part+3+/11635< / a > < br > < a href = "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" > http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" > http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" > http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" > http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" > http://lists.apple.com/archives/security-announce/2012/May/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" > http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" > http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" > http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" > http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" > http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=132750579901589&w=2" > http://marc.info/?l=bugtraq& m=132750579901589& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=132872385320240&w=2" > http://marc.info/?l=bugtraq& m=132872385320240& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=133365109612558&w=2" > http://marc.info/?l=bugtraq& m=133365109612558& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=133728004526190&w=2" > http://marc.info/?l=bugtraq& m=133728004526190& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=134254866602253
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://rhn.redhat.com/errata/RHSA-2015-2131.html" > http://rhn.redhat.com/errata/RHSA-2015-2131.html< / a > < br > < a href = "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" > http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html< / a > < br > < a href = "http://www.securitytracker.com/id/1034221" > http://www.securitytracker.com/id/1034221< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-3276" > https://access.redhat.com/security/cve/CVE-2015-3276< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1238322" > https://bugzilla.redhat.com/show_bug.cgi?id=1238322< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2015-3276.html" > https://linux.oracle.com/cve/CVE-2015-3276.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2015-2131.html" > https://linux.oracle.com/errata/ELSA-2015-2131.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2015-3276" > https://nvd.nist.gov/vuln/detail/CVE-2015-3276< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openldap.org/its/index.cgi?findid=8703" > http://www.openldap.org/its/index.cgi?findid=8703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-14159" > https://access.redhat.com/security/cve/CVE-2017-14159< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html< / a > < br > < a href = "http://www.openldap.org/its/index.cgi/Incoming?id=8759" > http://www.openldap.org/its/index.cgi/Incoming?id=8759< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-17740" > https://access.redhat.com/security/cve/CVE-2017-17740< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" > http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html< / a > < br > < a href = "https://access.redhat.com/errata/RHBA-2019:3674" > https://access.redhat.com/errata/RHBA-2019:3674< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-15719" > https://access.redhat.com/security/cve/CVE-2020-15719< / a > < br > < a href = "https://bugs.openldap.org/show_bug.cgi?id=9266" > https://bugs.openldap.org/show_bug.cgi?id=9266< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" > https://bugzilla.redhat.com/show_bug.cgi?id=1740070< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-06-17 09:15:27 +00:00
| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1586" > https://access.redhat.com/security/cve/CVE-2022-1586< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077976," > https://bugzilla.redhat.com/show_bug.cgi?id=2077976,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a," > https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c" > https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1586.html" > https://linux.oracle.com/cve/CVE-2022-1586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1586" > https://nvd.nist.gov/vuln/detail/CVE-2022-1586< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1587" > https://access.redhat.com/security/cve/CVE-2022-1587< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077983," > https://bugzilla.redhat.com/show_bug.cgi?id=2077983,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0" > https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1587.html" > https://linux.oracle.com/cve/CVE-2022-1587.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1587" > https://nvd.nist.gov/vuln/detail/CVE-2022-1587< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html" > http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2018/Dec/33" > http://seclists.org/fulldisclosure/2018/Dec/33< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/11" > http://www.openwall.com/lists/oss-security/2017/11/01/11< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/3" > http://www.openwall.com/lists/oss-security/2017/11/01/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/7" > http://www.openwall.com/lists/oss-security/2017/11/01/7< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/8" > http://www.openwall.com/lists/oss-security/2017/11/01/8< / a > < br > < a href = "http://www.securityfocus.com/bid/101688" > http://www.securityfocus.com/bid/101688< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-16231" > https://access.redhat.com/security/cve/CVE-2017-16231< / a > < br > < a href = "https://bugs.exim.org/show_bug.cgi?id=2047" > https://bugs.exim.org/show_bug.cgi?id=2047< / a > < br > < / details > |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/97067" > http://www.securityfocus.com/bid/97067< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2486" > https://access.redhat.com/errata/RHSA-2018:2486< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7245" > https://access.redhat.com/security/cve/CVE-2017-7245< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" > https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/< / a > < br > < a href = "https://security.gentoo.org/glsa/201710-25" > https://security.gentoo.org/glsa/201710-25< / a > < br > < / details > |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/97067" > http://www.securityfocus.com/bid/97067< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2486" > https://access.redhat.com/errata/RHSA-2018:2486< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7246" > https://access.redhat.com/security/cve/CVE-2017-7246< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" > https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/< / a > < br > < a href = "https://security.gentoo.org/glsa/201710-25" > https://security.gentoo.org/glsa/201710-25< / a > < br > < / details > |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20838" > https://access.redhat.com/security/cve/CVE-2019-20838< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4373.html" > https://errata.almalinux.org/8/ALSA-2021-4373.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20838.html" > https://linux.oracle.com/cve/CVE-2019-20838.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20838" > https://nvd.nist.gov/vuln/detail/CVE-2019-20838< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5425-1" > https://ubuntu.com/security/notices/USN-5425-1< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36084" > https://access.redhat.com/security/cve/CVE-2021-36084< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3" > https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36084.html" > https://linux.oracle.com/cve/CVE-2021-36084.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36085" > https://access.redhat.com/security/cve/CVE-2021-36085< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba" > https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36085.html" > https://linux.oracle.com/cve/CVE-2021-36085.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36086" > https://access.redhat.com/security/cve/CVE-2021-36086< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8" > https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36086.html" > https://linux.oracle.com/cve/CVE-2021-36086.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36087" > https://access.redhat.com/security/cve/CVE-2021-36087< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521" > https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36087.html" > https://linux.oracle.com/cve/CVE-2021-36087.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/" > https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-45346" > https://access.redhat.com/security/cve/CVE-2021-45346< / a > < br > < a href = "https://github.com/guyinatuxedo/sqlite3_record_leaking" > https://github.com/guyinatuxedo/sqlite3_record_leaking< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0001/" > https://security.netapp.com/advisory/ntap-20220303-0001/< / a > < br > < a href = "https://sqlite.org/forum/forumpost/53de8864ba114bf6" > https://sqlite.org/forum/forumpost/53de8864ba114bf6< / a > < br > < / details > |
| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36690" > https://nvd.nist.gov/vuln/detail/CVE-2021-36690< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5403-1" > https://ubuntu.com/security/notices/USN-5403-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.sqlite.org/forum/forumpost/718c0a8d17" > https://www.sqlite.org/forum/forumpost/718c0a8d17< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| libssl1.1 | CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/" > http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html" > http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html" > http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html< / a > < br > < a href = "http://rump2007.cr.yp.to/15-shumow.pdf" > http://rump2007.cr.yp.to/15-shumow.pdf< / a > < br > < a href = "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/" > http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/< / a > < br > < a href = "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect" > http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect< / a > < br > < a href = "http://www.securityfocus.com/bid/63657" > http://www.securityfocus.com/bid/63657< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2007-6755" > https://access.redhat.com/security/cve/CVE-2007-6755< / a > < br > < a href = "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html" > https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html< / a > < br > < / details > |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/" > http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/< / a > < br > < a href = "http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf" > http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf< / a > < br > < a href = "http://www.networkworld.com/news/2010/030410-rsa-security-attack.html" > http://www.networkworld.com/news/2010/030410-rsa-security-attack.html< / a > < br > < a href = "http://www.osvdb.org/62808" > http://www.osvdb.org/62808< / a > < br > < a href = "http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/" > http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-0928" > https://access.redhat.com/security/cve/CVE-2010-0928< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/56750" > https://exchange.xforce.ibmcloud.com/vulnerabilities/56750< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357" > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/10/01/9" > http://www.openwall.com/lists/oss-security/2013/10/01/9< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-4392" > https://access.redhat.com/security/cve/CVE-2013-4392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=859060" > https://bugzilla.redhat.com/show_bug.cgi?id=859060< / a > < br > < / details > |
| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/04/2" > http://www.openwall.com/lists/oss-security/2021/08/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/08/17/3" > http://www.openwall.com/lists/oss-security/2021/08/17/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/09/07/3" > http://www.openwall.com/lists/oss-security/2021/09/07/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13529" > https://access.redhat.com/security/cve/CVE-2020-13529< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13529.html" > https://linux.oracle.com/cve/CVE-2020-13529.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4361.html" > https://linux.oracle.com/errata/ELSA-2021-4361.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-48" > https://security.gentoo.org/glsa/202107-48< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210625-0005/" > https://security.netapp.com/advisory/ntap-20210625-0005/< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-1" > https://ubuntu.com/security/notices/USN-5013-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-2" > https://ubuntu.com/security/notices/USN-5013-2< / a > < br > < / details > |
2022-06-17 09:15:27 +00:00
| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357" > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/10/01/9" > http://www.openwall.com/lists/oss-security/2013/10/01/9< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-4392" > https://access.redhat.com/security/cve/CVE-2013-4392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=859060" > https://bugzilla.redhat.com/show_bug.cgi?id=859060< / a > < br > < / details > |
| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/04/2" > http://www.openwall.com/lists/oss-security/2021/08/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/08/17/3" > http://www.openwall.com/lists/oss-security/2021/08/17/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/09/07/3" > http://www.openwall.com/lists/oss-security/2021/09/07/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13529" > https://access.redhat.com/security/cve/CVE-2020-13529< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13529.html" > https://linux.oracle.com/cve/CVE-2020-13529.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4361.html" > https://linux.oracle.com/errata/ELSA-2021-4361.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-48" > https://security.gentoo.org/glsa/202107-48< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210625-0005/" > https://security.netapp.com/advisory/ntap-20210625-0005/< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-1" > https://ubuntu.com/security/notices/USN-5013-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-2" > https://ubuntu.com/security/notices/USN-5013-2< / a > < br > < / details > |
| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2015-9019" > https://access.redhat.com/security/cve/CVE-2015-9019< / a > < br > < a href = "https://bugzilla.gnome.org/show_bug.cgi?id=758400" > https://bugzilla.gnome.org/show_bug.cgi?id=758400< / a > < br > < a href = "https://bugzilla.suse.com/show_bug.cgi?id=934119" > https://bugzilla.suse.com/show_bug.cgi?id=934119< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019< / a > < br > < / details > |
| locales | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| locales | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
| locales | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| locales | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| locales | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| locales | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| locales | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| locales | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "http://secunia.com/advisories/27215" > http://secunia.com/advisories/27215< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482129/100/100/threaded" > http://www.securityfocus.com/archive/1/482129/100/100/threaded< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482857/100/0/threaded" > http://www.securityfocus.com/archive/1/482857/100/0/threaded< / a > < br > < a href = "http://www.securityfocus.com/bid/26048" > http://www.securityfocus.com/bid/26048< / a > < br > < a href = "http://www.vupen.com/english/advisories/2007/3474" > http://www.vupen.com/english/advisories/2007/3474< / a > < br > < a href = "https://issues.rpath.com/browse/RPL-1825" > https://issues.rpath.com/browse/RPL-1825< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19882" > https://access.redhat.com/security/cve/CVE-2019-19882< / a > < br > < a href = "https://bugs.archlinux.org/task/64836" > https://bugs.archlinux.org/task/64836< / a > < br > < a href = "https://bugs.gentoo.org/702252" > https://bugs.gentoo.org/702252< / a > < br > < a href = "https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75" > https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/199" > https://github.com/shadow-maint/shadow/pull/199< / a > < br > < a href = "https://github.com/void-linux/void-packages/pull/17580" > https://github.com/void-linux/void-packages/pull/17580< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-09" > https://security.gentoo.org/glsa/202008-09< / a > < br > < / details > |
| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-06-17 09:15:27 +00:00
| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| openssl | CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/" > http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html" > http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html" > http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html< / a > < br > < a href = "http://rump2007.cr.yp.to/15-shumow.pdf" > http://rump2007.cr.yp.to/15-shumow.pdf< / a > < br > < a href = "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/" > http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/< / a > < br > < a href = "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect" > http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect< / a > < br > < a href = "http://www.securityfocus.com/bid/63657" > http://www.securityfocus.com/bid/63657< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2007-6755" > https://access.redhat.com/security/cve/CVE-2007-6755< / a > < br > < a href = "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html" > https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html< / a > < br > < / details > |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/" > http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/< / a > < br > < a href = "http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf" > http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf< / a > < br > < a href = "http://www.networkworld.com/news/2010/030410-rsa-security-attack.html" > http://www.networkworld.com/news/2010/030410-rsa-security-attack.html< / a > < br > < a href = "http://www.osvdb.org/62808" > http://www.osvdb.org/62808< / a > < br > < a href = "http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/" > http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-0928" > https://access.redhat.com/security/cve/CVE-2010-0928< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/56750" > https://exchange.xforce.ibmcloud.com/vulnerabilities/56750< / a > < br > < / details > |
2022-06-11 19:16:07 +00:00
| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "http://secunia.com/advisories/27215" > http://secunia.com/advisories/27215< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482129/100/100/threaded" > http://www.securityfocus.com/archive/1/482129/100/100/threaded< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482857/100/0/threaded" > http://www.securityfocus.com/archive/1/482857/100/0/threaded< / a > < br > < a href = "http://www.securityfocus.com/bid/26048" > http://www.securityfocus.com/bid/26048< / a > < br > < a href = "http://www.vupen.com/english/advisories/2007/3474" > http://www.vupen.com/english/advisories/2007/3474< / a > < br > < a href = "https://issues.rpath.com/browse/RPL-1825" > https://issues.rpath.com/browse/RPL-1825< / a > < br > < / details > |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19882" > https://access.redhat.com/security/cve/CVE-2019-19882< / a > < br > < a href = "https://bugs.archlinux.org/task/64836" > https://bugs.archlinux.org/task/64836< / a > < br > < a href = "https://bugs.gentoo.org/702252" > https://bugs.gentoo.org/702252< / a > < br > < a href = "https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75" > https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/199" > https://github.com/shadow-maint/shadow/pull/199< / a > < br > < a href = "https://github.com/void-linux/void-packages/pull/17580" > https://github.com/void-linux/void-packages/pull/17580< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-09" > https://security.gentoo.org/glsa/202008-09< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2011/11/04/2" > http://www.openwall.com/lists/oss-security/2011/11/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2011/11/04/4" > http://www.openwall.com/lists/oss-security/2011/11/04/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2011-4116" > https://access.redhat.com/security/cve/CVE-2011-4116< / a > < br > < a href = "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14" > https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14< / a > < br > < a href = "https://rt.cpan.org/Public/Bug/Display.html?id=69106" > https://rt.cpan.org/Public/Bug/Display.html?id=69106< / a > < br > < a href = "https://seclists.org/oss-sec/2011/q4/238" > https://seclists.org/oss-sec/2011/q4/238< / a > < br > < / details > |
| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://marc.info/?l=bugtraq&m=112327628230258&w=2" > http://marc.info/?l=bugtraq& m=112327628230258& w=2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2005-2541" > https://access.redhat.com/security/cve/CVE-2005-2541< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < / details > |
| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-02-22 10:34:01 +00:00
2022-05-18 20:10:07 +00:00
**jar**
| No Vulnerabilities found |
|:---------------------------------|
2022-02-22 10:34:01 +00:00
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-06-21 09:20:23 +00:00
| github.com/opencontainers/runc | CVE-2022-29162 | HIGH | v1.0.1 | v1.1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29162" > https://access.redhat.com/security/cve/CVE-2022-29162< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5" > https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5< / a > < br > < a href = "https://github.com/opencontainers/runc/releases/tag/v1.1.2" > https://github.com/opencontainers/runc/releases/tag/v1.1.2< / a > < br > < a href = "https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66" > https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29162" > https://nvd.nist.gov/vuln/detail/CVE-2022-29162< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43784" > https://access.redhat.com/security/cve/CVE-2021-43784< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2241" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2241< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554" > https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae" > https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed" > https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed< / a > < br > < a href = "https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f" > https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43784" > https://nvd.nist.gov/vuln/detail/CVE-2021-43784< / a > < br > < / details > |
2022-06-14 07:37:23 +00:00
| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/05/12/1" > http://www.openwall.com/lists/oss-security/2022/05/12/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-24769" > https://access.redhat.com/security/cve/CVE-2022-24769< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769< / a > < br > < a href = "https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c" > https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c< / a > < br > < a href = "https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f" > https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f< / a > < br > < a href = "https://github.com/moby/moby/releases/tag/v20.10.14" > https://github.com/moby/moby/releases/tag/v20.10.14< / a > < br > < a href = "https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq" > https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24769" > https://nvd.nist.gov/vuln/detail/CVE-2022-24769< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5162" > https://www.debian.org/security/2022/dsa-5162< / a > < br > < / details > |
2022-02-22 10:34:01 +00:00
2022-05-18 20:10:07 +00:00
2022-07-04 22:32:57 +00:00
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
2022-05-18 20:10:07 +00:00
2022-07-04 22:32:57 +00:00
**ubuntu**
2022-02-22 10:34:01 +00:00
2022-07-04 22:32:57 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43618" > https://access.redhat.com/security/cve/CVE-2021-43618< / a > < br > < a href = "https://bugs.debian.org/994405" > https://bugs.debian.org/994405< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618< / a > < br > < a href = "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" > https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html< / a > < br > < a href = "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" > https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43618" > https://nvd.nist.gov/vuln/detail/CVE-2021-43618< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1586" > https://access.redhat.com/security/cve/CVE-2022-1586< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077976," > https://bugzilla.redhat.com/show_bug.cgi?id=2077976,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a," > https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c" > https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1586.html" > https://linux.oracle.com/cve/CVE-2022-1586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1586" > https://nvd.nist.gov/vuln/detail/CVE-2022-1586< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1587" > https://access.redhat.com/security/cve/CVE-2022-1587< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077983," > https://bugzilla.redhat.com/show_bug.cgi?id=2077983,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0" > https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1587.html" > https://linux.oracle.com/cve/CVE-2022-1587.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1587" > https://nvd.nist.gov/vuln/detail/CVE-2022-1587< / a > < br > < / details > |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/HT211168" > https://support.apple.com/HT211168< / a > < br > < a href = "https://support.apple.com/HT211170" > https://support.apple.com/HT211170< / a > < br > < a href = "https://support.apple.com/HT211171" > https://support.apple.com/HT211171< / a > < br > < a href = "https://support.apple.com/HT211175" > https://support.apple.com/HT211175< / a > < br > < a href = "https://support.apple.com/HT211178" > https://support.apple.com/HT211178< / a > < br > < a href = "https://support.apple.com/HT211179" > https://support.apple.com/HT211179< / a > < br > < a href = "https://support.apple.com/HT211181" > https://support.apple.com/HT211181< / a > < br > < a href = "https://vuldb.com/?id.155768" > https://vuldb.com/?id.155768< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/en-us/HT211935" > https://support.apple.com/en-us/HT211935< / a > < br > < a href = "https://support.apple.com/en-us/HT211952" > https://support.apple.com/en-us/HT211952< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211847" > https://support.apple.com/en-us/HT211847< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211846" > https://support.apple.com/kb/HT211846< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/< / a > < br > < / details > |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| libssl1.1 | CVE-2022-2097 | MEDIUM | 1.1.1f-1ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| openssl | CVE-2022-2097 | MEDIUM | 1.1.1f-1ubuntu2.13 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-31879" > https://access.redhat.com/security/cve/CVE-2021-31879< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879< / a > < br > < a href = "https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html" > https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-31879" > https://nvd.nist.gov/vuln/detail/CVE-2021-31879< / a > < br > < a href = "https://savannah.gnu.org/bugs/?56909" > https://savannah.gnu.org/bugs/?56909< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210618-0002/" > https://security.netapp.com/advisory/ntap-20210618-0002/< / a > < br > < / details > |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
#### Container: tccr.io/truecharts/redis:v7.0.2@sha256:6fdca1a975247a29f5ed76752f99e880f0052672347b575c387e406fff09e3c8 (debian 11.3)
2022-06-23 02:09:03 +00:00
**debian**
2022-05-18 20:10:07 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-06-23 02:09:03 +00:00
| apt | CVE-2011-3374 | LOW | 2.2.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2011-3374" > https://access.redhat.com/security/cve/cve-2011-3374< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480< / a > < br > < a href = "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html" > https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html< / a > < br > < a href = "https://seclists.org/fulldisclosure/2011/Sep/221" > https://seclists.org/fulldisclosure/2011/Sep/221< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2011-3374" > https://security-tracker.debian.org/tracker/CVE-2011-3374< / a > < br > < a href = "https://snyk.io/vuln/SNYK-LINUX-APT-116518" > https://snyk.io/vuln/SNYK-LINUX-APT-116518< / a > < br > < a href = "https://ubuntu.com/security/CVE-2011-3374" > https://ubuntu.com/security/CVE-2011-3374< / a > < br > < / details > |
| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| coreutils | CVE-2016-2781 | LOW | 8.32-4 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| coreutils | CVE-2017-18018 | LOW | 8.32-4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html" > http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-18018" > https://access.redhat.com/security/cve/CVE-2017-18018< / a > < br > < / details > |
| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22945" > https://access.redhat.com/security/cve/CVE-2021-22945< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22945.html" > https://curl.se/docs/CVE-2021-22945.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945< / a > < br > < a href = "https://hackerone.com/reports/1269242" > https://hackerone.com/reports/1269242< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" > https://nvd.nist.gov/vuln/detail/CVE-2021-22945< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22946" > https://access.redhat.com/security/cve/CVE-2021-22946< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22946.html" > https://curl.se/docs/CVE-2021-22946.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946< / a > < br > < a href = "https://hackerone.com/reports/1334111" > https://hackerone.com/reports/1334111< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22946.html" > https://linux.oracle.com/cve/CVE-2021-22946.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" > https://nvd.nist.gov/vuln/detail/CVE-2021-22946< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0008/" > https://security.netapp.com/advisory/ntap-20220121-0008/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://hackerone.com/reports/1526328" > https://hackerone.com/reports/1526328< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22576.html" > https://linux.oracle.com/cve/CVE-2022-22576.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22576" > https://nvd.nist.gov/vuln/detail/CVE-2022-22576< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://hackerone.com/reports/1546268" > https://hackerone.com/reports/1546268< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27775" > https://nvd.nist.gov/vuln/detail/CVE-2022-27775< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27781" > https://access.redhat.com/security/cve/CVE-2022-27781< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27781.html" > https://curl.se/docs/CVE-2022-27781.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781< / a > < br > < a href = "https://github.com/curl/curl/commit/f6c335d63f" > https://github.com/curl/curl/commit/f6c335d63f< / a > < br > < a href = "https://hackerone.com/reports/1555441" > https://hackerone.com/reports/1555441< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27781" > https://nvd.nist.gov/vuln/detail/CVE-2022-27781< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27782" > https://access.redhat.com/security/cve/CVE-2022-27782< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27782.html" > https://curl.se/docs/CVE-2022-27782.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782< / a > < br > < a href = "https://hackerone.com/reports/1555796" > https://hackerone.com/reports/1555796< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27782.html" > https://linux.oracle.com/cve/CVE-2022-27782.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27782" > https://nvd.nist.gov/vuln/detail/CVE-2022-27782< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22947" > https://access.redhat.com/security/cve/CVE-2021-22947< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22947.html" > https://curl.se/docs/CVE-2021-22947.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947< / a > < br > < a href = "https://hackerone.com/reports/1334763" > https://hackerone.com/reports/1334763< / a > < br > < a href = "https://launchpad.net/bugs/1944120 (regression bug)" > https://launchpad.net/bugs/1944120 (regression bug)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22947.html" > https://linux.oracle.com/cve/CVE-2021-22947.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" > https://nvd.nist.gov/vuln/detail/CVE-2021-22947< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-3" > https://ubuntu.com/security/notices/USN-5079-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-4" > https://ubuntu.com/security/notices/USN-5079-4< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://hackerone.com/reports/1543773" > https://hackerone.com/reports/1543773< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27774.html" > https://linux.oracle.com/cve/CVE-2022-27774.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27774" > https://nvd.nist.gov/vuln/detail/CVE-2022-27774< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://hackerone.com/reports/1547048" > https://hackerone.com/reports/1547048< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27776.html" > https://linux.oracle.com/cve/CVE-2022-27776.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27776" > https://nvd.nist.gov/vuln/detail/CVE-2022-27776< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-32205 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32205" > https://access.redhat.com/security/cve/CVE-2022-32205< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32205.html" > https://curl.se/docs/CVE-2022-32205.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32206 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32207 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32207" > https://access.redhat.com/security/cve/CVE-2022-32207< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32207.html" > https://curl.se/docs/CVE-2022-32207.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32208 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/07/21/4" > http://www.openwall.com/lists/oss-security/2021/07/21/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22898" > https://access.redhat.com/security/cve/CVE-2021-22898< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22898.html" > https://curl.se/docs/CVE-2021-22898.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4511.html" > https://errata.almalinux.org/8/ALSA-2021-4511.html< / a > < br > < a href = "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde" > https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde< / a > < br > < a href = "https://hackerone.com/reports/1176461" > https://hackerone.com/reports/1176461< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22898.html" > https://linux.oracle.com/cve/CVE-2021-22898.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4511.html" > https://linux.oracle.com/errata/ELSA-2021-4511.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" > https://nvd.nist.gov/vuln/detail/CVE-2021-22898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-2" > https://ubuntu.com/security/notices/USN-5021-2< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22922" > https://access.redhat.com/security/cve/CVE-2021-22922< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22922.html" > https://curl.se/docs/CVE-2021-22922.html< / a > < br > < a href = "https://hackerone.com/reports/1213175" > https://hackerone.com/reports/1213175< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22922.html" > https://linux.oracle.com/cve/CVE-2021-22922.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" > https://nvd.nist.gov/vuln/detail/CVE-2021-22922< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22923" > https://access.redhat.com/security/cve/CVE-2021-22923< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22923.html" > https://curl.se/docs/CVE-2021-22923.html< / a > < br > < a href = "https://hackerone.com/reports/1213181" > https://hackerone.com/reports/1213181< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22923.html" > https://linux.oracle.com/cve/CVE-2021-22923.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" > https://nvd.nist.gov/vuln/detail/CVE-2021-22923< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22924" > https://access.redhat.com/security/cve/CVE-2021-22924< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22924.html" > https://curl.se/docs/CVE-2021-22924.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924< / a > < br > < a href = "https://hackerone.com/reports/1223565" > https://hackerone.com/reports/1223565< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22924.html" > https://linux.oracle.com/cve/CVE-2021-22924.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" > https://nvd.nist.gov/vuln/detail/CVE-2021-22924< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2011-3374" > https://access.redhat.com/security/cve/cve-2011-3374< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480< / a > < br > < a href = "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html" > https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html< / a > < br > < a href = "https://seclists.org/fulldisclosure/2011/Sep/221" > https://seclists.org/fulldisclosure/2011/Sep/221< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2011-3374" > https://security-tracker.debian.org/tracker/CVE-2011-3374< / a > < br > < a href = "https://snyk.io/vuln/SNYK-LINUX-APT-116518" > https://snyk.io/vuln/SNYK-LINUX-APT-116518< / a > < br > < a href = "https://ubuntu.com/security/CVE-2011-3374" > https://ubuntu.com/security/CVE-2011-3374< / a > < br > < / details > |
| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22945" > https://access.redhat.com/security/cve/CVE-2021-22945< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22945.html" > https://curl.se/docs/CVE-2021-22945.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945< / a > < br > < a href = "https://hackerone.com/reports/1269242" > https://hackerone.com/reports/1269242< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" > https://nvd.nist.gov/vuln/detail/CVE-2021-22945< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22946" > https://access.redhat.com/security/cve/CVE-2021-22946< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22946.html" > https://curl.se/docs/CVE-2021-22946.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946< / a > < br > < a href = "https://hackerone.com/reports/1334111" > https://hackerone.com/reports/1334111< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22946.html" > https://linux.oracle.com/cve/CVE-2021-22946.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" > https://nvd.nist.gov/vuln/detail/CVE-2021-22946< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220121-0008/" > https://security.netapp.com/advisory/ntap-20220121-0008/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://hackerone.com/reports/1526328" > https://hackerone.com/reports/1526328< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-22576.html" > https://linux.oracle.com/cve/CVE-2022-22576.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-22576" > https://nvd.nist.gov/vuln/detail/CVE-2022-22576< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://hackerone.com/reports/1546268" > https://hackerone.com/reports/1546268< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27775" > https://nvd.nist.gov/vuln/detail/CVE-2022-27775< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27781" > https://access.redhat.com/security/cve/CVE-2022-27781< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27781.html" > https://curl.se/docs/CVE-2022-27781.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781< / a > < br > < a href = "https://github.com/curl/curl/commit/f6c335d63f" > https://github.com/curl/curl/commit/f6c335d63f< / a > < br > < a href = "https://hackerone.com/reports/1555441" > https://hackerone.com/reports/1555441< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27781" > https://nvd.nist.gov/vuln/detail/CVE-2022-27781< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27782" > https://access.redhat.com/security/cve/CVE-2022-27782< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27782.html" > https://curl.se/docs/CVE-2022-27782.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782< / a > < br > < a href = "https://hackerone.com/reports/1555796" > https://hackerone.com/reports/1555796< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27782.html" > https://linux.oracle.com/cve/CVE-2022-27782.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27782" > https://nvd.nist.gov/vuln/detail/CVE-2022-27782< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0009/" > https://security.netapp.com/advisory/ntap-20220609-0009/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5412-1" > https://ubuntu.com/security/notices/USN-5412-1< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22947" > https://access.redhat.com/security/cve/CVE-2021-22947< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22947.html" > https://curl.se/docs/CVE-2021-22947.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947< / a > < br > < a href = "https://hackerone.com/reports/1334763" > https://hackerone.com/reports/1334763< / a > < br > < a href = "https://launchpad.net/bugs/1944120 (regression bug)" > https://launchpad.net/bugs/1944120 (regression bug)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22947.html" > https://linux.oracle.com/cve/CVE-2021-22947.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4059.html" > https://linux.oracle.com/errata/ELSA-2021-4059.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" > https://nvd.nist.gov/vuln/detail/CVE-2021-22947< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211029-0003/" > https://security.netapp.com/advisory/ntap-20211029-0003/< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-1" > https://ubuntu.com/security/notices/USN-5079-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-2" > https://ubuntu.com/security/notices/USN-5079-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-3" > https://ubuntu.com/security/notices/USN-5079-3< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5079-4" > https://ubuntu.com/security/notices/USN-5079-4< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://hackerone.com/reports/1543773" > https://hackerone.com/reports/1543773< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27774.html" > https://linux.oracle.com/cve/CVE-2022-27774.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27774" > https://nvd.nist.gov/vuln/detail/CVE-2022-27774< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://hackerone.com/reports/1547048" > https://hackerone.com/reports/1547048< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-27776.html" > https://linux.oracle.com/cve/CVE-2022-27776.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5313.html" > https://linux.oracle.com/errata/ELSA-2022-5313.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-27776" > https://nvd.nist.gov/vuln/detail/CVE-2022-27776< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220609-0008/" > https://security.netapp.com/advisory/ntap-20220609-0008/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32205 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32205" > https://access.redhat.com/security/cve/CVE-2022-32205< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32205.html" > https://curl.se/docs/CVE-2022-32205.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32207 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32207" > https://access.redhat.com/security/cve/CVE-2022-32207< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32207.html" > https://curl.se/docs/CVE-2022-32207.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/07/21/4" > http://www.openwall.com/lists/oss-security/2021/07/21/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-22898" > https://access.redhat.com/security/cve/CVE-2021-22898< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22898.html" > https://curl.se/docs/CVE-2021-22898.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4511.html" > https://errata.almalinux.org/8/ALSA-2021-4511.html< / a > < br > < a href = "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde" > https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde< / a > < br > < a href = "https://hackerone.com/reports/1176461" > https://hackerone.com/reports/1176461< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22898.html" > https://linux.oracle.com/cve/CVE-2021-22898.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4511.html" > https://linux.oracle.com/errata/ELSA-2021-4511.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" > https://nvd.nist.gov/vuln/detail/CVE-2021-22898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-2" > https://ubuntu.com/security/notices/USN-5021-2< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22922" > https://access.redhat.com/security/cve/CVE-2021-22922< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22922.html" > https://curl.se/docs/CVE-2021-22922.html< / a > < br > < a href = "https://hackerone.com/reports/1213175" > https://hackerone.com/reports/1213175< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22922.html" > https://linux.oracle.com/cve/CVE-2021-22922.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" > https://nvd.nist.gov/vuln/detail/CVE-2021-22922< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22923" > https://access.redhat.com/security/cve/CVE-2021-22923< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22923.html" > https://curl.se/docs/CVE-2021-22923.html< / a > < br > < a href = "https://hackerone.com/reports/1213181" > https://hackerone.com/reports/1213181< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22923.html" > https://linux.oracle.com/cve/CVE-2021-22923.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" > https://nvd.nist.gov/vuln/detail/CVE-2021-22923< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-22924" > https://access.redhat.com/security/cve/CVE-2021-22924< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf< / a > < br > < a href = "https://curl.se/docs/CVE-2021-22924.html" > https://curl.se/docs/CVE-2021-22924.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924< / a > < br > < a href = "https://hackerone.com/reports/1223565" > https://hackerone.com/reports/1223565< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-22924.html" > https://linux.oracle.com/cve/CVE-2021-22924.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3582.html" > https://linux.oracle.com/errata/ELSA-2021-3582.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" > https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" > https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" > https://nvd.nist.gov/vuln/detail/CVE-2021-22924< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0003/" > https://security.netapp.com/advisory/ntap-20210902-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5021-1" > https://ubuntu.com/security/notices/USN-5021-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-8457" > https://access.redhat.com/security/cve/CVE-2019-8457< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-8457.html" > https://linux.oracle.com/cve/CVE-2019-8457.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1810.html" > https://linux.oracle.com/errata/ELSA-2020-1810.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190606-0002/" > https://security.netapp.com/advisory/ntap-20190606-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4004-1" > https://ubuntu.com/security/notices/USN-4004-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4004-2" > https://ubuntu.com/security/notices/USN-4004-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4019-1" > https://ubuntu.com/security/notices/USN-4019-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4019-2" > https://ubuntu.com/security/notices/USN-4019-2< / a > < br > < a href = "https://usn.ubuntu.com/4004-1/" > https://usn.ubuntu.com/4004-1/< / a > < br > < a href = "https://usn.ubuntu.com/4004-2/" > https://usn.ubuntu.com/4004-2/< / a > < br > < a href = "https://usn.ubuntu.com/4019-1/" > https://usn.ubuntu.com/4019-1/< / a > < br > < a href = "https://usn.ubuntu.com/4019-2/" > https://usn.ubuntu.com/4019-2/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2020.html" > https://www.oracle.com/security-alerts/cpujan2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < a href = "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" > https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html< / a > < br > < a href = "https://www.sqlite.org/releaselog/3_28_0.html" > https://www.sqlite.org/releaselog/3_28_0.html< / a > < br > < a href = "https://www.sqlite.org/src/info/90acdbfce9c08858" > https://www.sqlite.org/src/info/90acdbfce9c08858< / a > < br > < / details > |
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-33560" > https://access.redhat.com/security/cve/CVE-2021-33560< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560< / a > < br > < a href = "https://dev.gnupg.org/T5305" > https://dev.gnupg.org/T5305< / a > < br > < a href = "https://dev.gnupg.org/T5328" > https://dev.gnupg.org/T5328< / a > < br > < a href = "https://dev.gnupg.org/T5466" > https://dev.gnupg.org/T5466< / a > < br > < a href = "https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61" > https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61< / a > < br > < a href = "https://eprint.iacr.org/2021/923" > https://eprint.iacr.org/2021/923< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4409.html" > https://errata.almalinux.org/8/ALSA-2021-4409.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33560.html" > https://linux.oracle.com/cve/CVE-2021-33560.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9263.html" > https://linux.oracle.com/errata/ELSA-2022-9263.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33560" > https://nvd.nist.gov/vuln/detail/CVE-2021-33560< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5080-1" > https://ubuntu.com/security/notices/USN-5080-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5080-2" > https://ubuntu.com/security/notices/USN-5080-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-6829" > https://access.redhat.com/security/cve/CVE-2018-6829< / a > < br > < a href = "https://github.com/weikengchen/attack-on-libgcrypt-elgamal" > https://github.com/weikengchen/attack-on-libgcrypt-elgamal< / a > < br > < a href = "https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki" > https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html" > https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2020.html" > https://www.oracle.com/security-alerts/cpujan2020.html< / a > < br > < / details > |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-4209" > https://access.redhat.com/security/cve/CVE-2021-4209< / a > < br > < / details > |
| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | | < details > < summary > Expand...< / summary > < a href = "http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/" > http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/< / a > < br > < a href = "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" > http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/< / a > < br > < a href = "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" > http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx< / a > < br > < a href = "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" > http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx< / a > < br > < a href = "http://curl.haxx.se/docs/adv_20120124B.html" > http://curl.haxx.se/docs/adv_20120124B.html< / a > < br > < a href = "http://downloads.asterisk.org/pub/security/AST-2016-001.html" > http://downloads.asterisk.org/pub/security/AST-2016-001.html< / a > < br > < a href = "http://ekoparty.org/2011/juliano-rizzo.php" > http://ekoparty.org/2011/juliano-rizzo.php< / a > < br > < a href = "http://eprint.iacr.org/2004/111" > http://eprint.iacr.org/2004/111< / a > < br > < a href = "http://eprint.iacr.org/2006/136" > http://eprint.iacr.org/2006/136< / a > < br > < a href = "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" > http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html< / a > < br > < a href = "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" > http://isc.sans.edu/diary/SSL+TLS+part+3+/11635< / a > < br > < a href = "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" > http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" > http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" > http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" > http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" > http://lists.apple.com/archives/security-announce/2012/May/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" > http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" > http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" > http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" > http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" > http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=132750579901589&w=2" > http://marc.info/?l=bugtraq& m=132750579901589& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=132872385320240&w=2" > http://marc.info/?l=bugtraq& m=132872385320240& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=133365109612558&w=2" > http://marc.info/?l=bugtraq& m=133365109612558& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=133728004526190&w=2" > http://marc.info/?l=bugtraq& m=133728004526190& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=134254866602253
| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304" > http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304< / a > < br > < a href = "http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" > http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml< / a > < br > < a href = "http://www.redhat.com/support/errata/RHSA-2005-012.html" > http://www.redhat.com/support/errata/RHSA-2005-012.html< / a > < br > < a href = "http://www.securityfocus.com/bid/11289" > http://www.securityfocus.com/bid/11289< / a > < br > < a href = "http://www.trustix.org/errata/2004/0050" > http://www.trustix.org/errata/2004/0050< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2004-0971" > https://access.redhat.com/security/cve/CVE-2004-0971< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" > https://exchange.xforce.ibmcloud.com/vulnerabilities/17583< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497" > https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497< / a > < br > < / details > |
| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-5709" > https://access.redhat.com/security/cve/CVE-2018-5709< / a > < br > < a href = "https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow" > https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://rhn.redhat.com/errata/RHSA-2015-2131.html" > http://rhn.redhat.com/errata/RHSA-2015-2131.html< / a > < br > < a href = "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" > http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html< / a > < br > < a href = "http://www.securitytracker.com/id/1034221" > http://www.securitytracker.com/id/1034221< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-3276" > https://access.redhat.com/security/cve/CVE-2015-3276< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1238322" > https://bugzilla.redhat.com/show_bug.cgi?id=1238322< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2015-3276.html" > https://linux.oracle.com/cve/CVE-2015-3276.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2015-2131.html" > https://linux.oracle.com/errata/ELSA-2015-2131.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2015-3276" > https://nvd.nist.gov/vuln/detail/CVE-2015-3276< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openldap.org/its/index.cgi?findid=8703" > http://www.openldap.org/its/index.cgi?findid=8703< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-14159" > https://access.redhat.com/security/cve/CVE-2017-14159< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html< / a > < br > < a href = "http://www.openldap.org/its/index.cgi/Incoming?id=8759" > http://www.openldap.org/its/index.cgi/Incoming?id=8759< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-17740" > https://access.redhat.com/security/cve/CVE-2017-17740< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html" > http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html" > http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html< / a > < br > < a href = "https://access.redhat.com/errata/RHBA-2019:3674" > https://access.redhat.com/errata/RHBA-2019:3674< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-15719" > https://access.redhat.com/security/cve/CVE-2020-15719< / a > < br > < a href = "https://bugs.openldap.org/show_bug.cgi?id=9266" > https://bugs.openldap.org/show_bug.cgi?id=9266< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1740070" > https://bugzilla.redhat.com/show_bug.cgi?id=1740070< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1586" > https://access.redhat.com/security/cve/CVE-2022-1586< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077976," > https://bugzilla.redhat.com/show_bug.cgi?id=2077976,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a," > https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c" > https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1586.html" > https://linux.oracle.com/cve/CVE-2022-1586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1586" > https://nvd.nist.gov/vuln/detail/CVE-2022-1586< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1587" > https://access.redhat.com/security/cve/CVE-2022-1587< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077983," > https://bugzilla.redhat.com/show_bug.cgi?id=2077983,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0" > https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1587.html" > https://linux.oracle.com/cve/CVE-2022-1587.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1587" > https://nvd.nist.gov/vuln/detail/CVE-2022-1587< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html" > http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2018/Dec/33" > http://seclists.org/fulldisclosure/2018/Dec/33< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/11" > http://www.openwall.com/lists/oss-security/2017/11/01/11< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/3" > http://www.openwall.com/lists/oss-security/2017/11/01/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/7" > http://www.openwall.com/lists/oss-security/2017/11/01/7< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/8" > http://www.openwall.com/lists/oss-security/2017/11/01/8< / a > < br > < a href = "http://www.securityfocus.com/bid/101688" > http://www.securityfocus.com/bid/101688< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-16231" > https://access.redhat.com/security/cve/CVE-2017-16231< / a > < br > < a href = "https://bugs.exim.org/show_bug.cgi?id=2047" > https://bugs.exim.org/show_bug.cgi?id=2047< / a > < br > < / details > |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/97067" > http://www.securityfocus.com/bid/97067< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2486" > https://access.redhat.com/errata/RHSA-2018:2486< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7245" > https://access.redhat.com/security/cve/CVE-2017-7245< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" > https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/< / a > < br > < a href = "https://security.gentoo.org/glsa/201710-25" > https://security.gentoo.org/glsa/201710-25< / a > < br > < / details > |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/97067" > http://www.securityfocus.com/bid/97067< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2486" > https://access.redhat.com/errata/RHSA-2018:2486< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7246" > https://access.redhat.com/security/cve/CVE-2017-7246< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" > https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/< / a > < br > < a href = "https://security.gentoo.org/glsa/201710-25" > https://security.gentoo.org/glsa/201710-25< / a > < br > < / details > |
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20838" > https://access.redhat.com/security/cve/CVE-2019-20838< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4373.html" > https://errata.almalinux.org/8/ALSA-2021-4373.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20838.html" > https://linux.oracle.com/cve/CVE-2019-20838.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20838" > https://nvd.nist.gov/vuln/detail/CVE-2019-20838< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5425-1" > https://ubuntu.com/security/notices/USN-5425-1< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36084" > https://access.redhat.com/security/cve/CVE-2021-36084< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3" > https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36084.html" > https://linux.oracle.com/cve/CVE-2021-36084.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36085" > https://access.redhat.com/security/cve/CVE-2021-36085< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba" > https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36085.html" > https://linux.oracle.com/cve/CVE-2021-36085.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36086" > https://access.redhat.com/security/cve/CVE-2021-36086< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8" > https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36086.html" > https://linux.oracle.com/cve/CVE-2021-36086.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36087" > https://access.redhat.com/security/cve/CVE-2021-36087< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521" > https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36087.html" > https://linux.oracle.com/cve/CVE-2021-36087.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/" > https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| libssl1.1 | CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/" > http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html" > http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html" > http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html< / a > < br > < a href = "http://rump2007.cr.yp.to/15-shumow.pdf" > http://rump2007.cr.yp.to/15-shumow.pdf< / a > < br > < a href = "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/" > http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/< / a > < br > < a href = "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect" > http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect< / a > < br > < a href = "http://www.securityfocus.com/bid/63657" > http://www.securityfocus.com/bid/63657< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2007-6755" > https://access.redhat.com/security/cve/CVE-2007-6755< / a > < br > < a href = "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html" > https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html< / a > < br > < / details > |
| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/" > http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/< / a > < br > < a href = "http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf" > http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf< / a > < br > < a href = "http://www.networkworld.com/news/2010/030410-rsa-security-attack.html" > http://www.networkworld.com/news/2010/030410-rsa-security-attack.html< / a > < br > < a href = "http://www.osvdb.org/62808" > http://www.osvdb.org/62808< / a > < br > < a href = "http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/" > http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-0928" > https://access.redhat.com/security/cve/CVE-2010-0928< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/56750" > https://exchange.xforce.ibmcloud.com/vulnerabilities/56750< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357" > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/10/01/9" > http://www.openwall.com/lists/oss-security/2013/10/01/9< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-4392" > https://access.redhat.com/security/cve/CVE-2013-4392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=859060" > https://bugzilla.redhat.com/show_bug.cgi?id=859060< / a > < br > < / details > |
| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/04/2" > http://www.openwall.com/lists/oss-security/2021/08/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/08/17/3" > http://www.openwall.com/lists/oss-security/2021/08/17/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/09/07/3" > http://www.openwall.com/lists/oss-security/2021/09/07/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13529" > https://access.redhat.com/security/cve/CVE-2020-13529< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13529.html" > https://linux.oracle.com/cve/CVE-2020-13529.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4361.html" > https://linux.oracle.com/errata/ELSA-2021-4361.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-48" > https://security.gentoo.org/glsa/202107-48< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210625-0005/" > https://security.netapp.com/advisory/ntap-20210625-0005/< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-1" > https://ubuntu.com/security/notices/USN-5013-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-2" > https://ubuntu.com/security/notices/USN-5013-2< / a > < br > < / details > |
| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357" > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/10/01/9" > http://www.openwall.com/lists/oss-security/2013/10/01/9< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-4392" > https://access.redhat.com/security/cve/CVE-2013-4392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=859060" > https://bugzilla.redhat.com/show_bug.cgi?id=859060< / a > < br > < / details > |
| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/04/2" > http://www.openwall.com/lists/oss-security/2021/08/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/08/17/3" > http://www.openwall.com/lists/oss-security/2021/08/17/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/09/07/3" > http://www.openwall.com/lists/oss-security/2021/09/07/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13529" > https://access.redhat.com/security/cve/CVE-2020-13529< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13529.html" > https://linux.oracle.com/cve/CVE-2020-13529.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4361.html" > https://linux.oracle.com/errata/ELSA-2021-4361.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-48" > https://security.gentoo.org/glsa/202107-48< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210625-0005/" > https://security.netapp.com/advisory/ntap-20210625-0005/< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-1" > https://ubuntu.com/security/notices/USN-5013-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-2" > https://ubuntu.com/security/notices/USN-5013-2< / a > < br > < / details > |
| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "http://secunia.com/advisories/27215" > http://secunia.com/advisories/27215< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482129/100/100/threaded" > http://www.securityfocus.com/archive/1/482129/100/100/threaded< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482857/100/0/threaded" > http://www.securityfocus.com/archive/1/482857/100/0/threaded< / a > < br > < a href = "http://www.securityfocus.com/bid/26048" > http://www.securityfocus.com/bid/26048< / a > < br > < a href = "http://www.vupen.com/english/advisories/2007/3474" > http://www.vupen.com/english/advisories/2007/3474< / a > < br > < a href = "https://issues.rpath.com/browse/RPL-1825" > https://issues.rpath.com/browse/RPL-1825< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19882" > https://access.redhat.com/security/cve/CVE-2019-19882< / a > < br > < a href = "https://bugs.archlinux.org/task/64836" > https://bugs.archlinux.org/task/64836< / a > < br > < a href = "https://bugs.gentoo.org/702252" > https://bugs.gentoo.org/702252< / a > < br > < a href = "https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75" > https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/199" > https://github.com/shadow-maint/shadow/pull/199< / a > < br > < a href = "https://github.com/void-linux/void-packages/pull/17580" > https://github.com/void-linux/void-packages/pull/17580< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-09" > https://security.gentoo.org/glsa/202008-09< / a > < br > < / details > |
| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
2022-07-05 20:53:58 +00:00
| openssl | CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220705.txt" > https://www.openssl.org/news/secadv/20220705.txt< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/" > http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html" > http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html< / a > < br > < a href = "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html" > http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html< / a > < br > < a href = "http://rump2007.cr.yp.to/15-shumow.pdf" > http://rump2007.cr.yp.to/15-shumow.pdf< / a > < br > < a href = "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/" > http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/< / a > < br > < a href = "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect" > http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect< / a > < br > < a href = "http://www.securityfocus.com/bid/63657" > http://www.securityfocus.com/bid/63657< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2007-6755" > https://access.redhat.com/security/cve/CVE-2007-6755< / a > < br > < a href = "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html" > https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html< / a > < br > < / details > |
| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u3 | | < details > < summary > Expand...< / summary > < a href = "http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/" > http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/< / a > < br > < a href = "http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf" > http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf< / a > < br > < a href = "http://www.networkworld.com/news/2010/030410-rsa-security-attack.html" > http://www.networkworld.com/news/2010/030410-rsa-security-attack.html< / a > < br > < a href = "http://www.osvdb.org/62808" > http://www.osvdb.org/62808< / a > < br > < a href = "http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/" > http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-0928" > https://access.redhat.com/security/cve/CVE-2010-0928< / a > < br > < a href = "https://exchange.xforce.ibmcloud.com/vulnerabilities/56750" > https://exchange.xforce.ibmcloud.com/vulnerabilities/56750< / a > < br > < / details > |
2022-06-23 02:09:03 +00:00
| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "http://secunia.com/advisories/27215" > http://secunia.com/advisories/27215< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482129/100/100/threaded" > http://www.securityfocus.com/archive/1/482129/100/100/threaded< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482857/100/0/threaded" > http://www.securityfocus.com/archive/1/482857/100/0/threaded< / a > < br > < a href = "http://www.securityfocus.com/bid/26048" > http://www.securityfocus.com/bid/26048< / a > < br > < a href = "http://www.vupen.com/english/advisories/2007/3474" > http://www.vupen.com/english/advisories/2007/3474< / a > < br > < a href = "https://issues.rpath.com/browse/RPL-1825" > https://issues.rpath.com/browse/RPL-1825< / a > < br > < / details > |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19882" > https://access.redhat.com/security/cve/CVE-2019-19882< / a > < br > < a href = "https://bugs.archlinux.org/task/64836" > https://bugs.archlinux.org/task/64836< / a > < br > < a href = "https://bugs.gentoo.org/702252" > https://bugs.gentoo.org/702252< / a > < br > < a href = "https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75" > https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/199" > https://github.com/shadow-maint/shadow/pull/199< / a > < br > < a href = "https://github.com/void-linux/void-packages/pull/17580" > https://github.com/void-linux/void-packages/pull/17580< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-09" > https://security.gentoo.org/glsa/202008-09< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2011/11/04/2" > http://www.openwall.com/lists/oss-security/2011/11/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2011/11/04/4" > http://www.openwall.com/lists/oss-security/2011/11/04/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2011-4116" > https://access.redhat.com/security/cve/CVE-2011-4116< / a > < br > < a href = "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14" > https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14< / a > < br > < a href = "https://rt.cpan.org/Public/Bug/Display.html?id=69106" > https://rt.cpan.org/Public/Bug/Display.html?id=69106< / a > < br > < a href = "https://seclists.org/oss-sec/2011/q4/238" > https://seclists.org/oss-sec/2011/q4/238< / a > < br > < / details > |
| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | | < details > < summary > Expand...< / summary > < a href = "http://marc.info/?l=bugtraq&m=112327628230258&w=2" > http://marc.info/?l=bugtraq& m=112327628230258& w=2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2005-2541" > https://access.redhat.com/security/cve/CVE-2005-2541< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < / details > |
| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/opencontainers/runc | CVE-2022-29162 | HIGH | v1.0.1 | v1.1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29162" > https://access.redhat.com/security/cve/CVE-2022-29162< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5" > https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5< / a > < br > < a href = "https://github.com/opencontainers/runc/releases/tag/v1.1.2" > https://github.com/opencontainers/runc/releases/tag/v1.1.2< / a > < br > < a href = "https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66" > https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVPZBV7ISA7QKRPTC7ZXWKMIQI2HZEBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D77CKD3AXPMU4PMQIQI5Q74SI4JATNND/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPQU4YC4AAY54JDXGDQHJEYKSXXG5T2Y/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29162" > https://nvd.nist.gov/vuln/detail/CVE-2022-29162< / a > < br > < / details > |
| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43784" > https://access.redhat.com/security/cve/CVE-2021-43784< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2241" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2241< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554" > https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae" > https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae< / a > < br > < a href = "https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed" > https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed< / a > < br > < a href = "https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f" > https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43784" > https://nvd.nist.gov/vuln/detail/CVE-2021-43784< / a > < br > < / details > |
| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/05/12/1" > http://www.openwall.com/lists/oss-security/2022/05/12/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-24769" > https://access.redhat.com/security/cve/CVE-2022-24769< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769< / a > < br > < a href = "https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c" > https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c< / a > < br > < a href = "https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f" > https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f< / a > < br > < a href = "https://github.com/moby/moby/releases/tag/v20.10.14" > https://github.com/moby/moby/releases/tag/v20.10.14< / a > < br > < a href = "https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq" > https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24769" > https://nvd.nist.gov/vuln/detail/CVE-2022-24769< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5162" > https://www.debian.org/security/2022/dsa-5162< / a > < br > < / details > |
**gobinary**
| No Vulnerabilities found |
|:---------------------------------|