2022-02-27 23:06:38 +00:00
---
hide:
- toc
---
# Security Overview
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
## Helm-Chart
##### Scan Results
#### Chart Object: grist/templates/common.yaml
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv001" > https://avd.aquasec.com/appshield/ksv001< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-grist' of Deployment ' RELEASE-NAME-grist' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv003" > https://avd.aquasec.com/appshield/ksv003< / a > < br > < / details > |
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | < details > < summary > Expand...< / summary > Enforcing CPU limits prevents DoS via resource exhaustion. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' resources.limits.cpu' < / details > | < details > < summary > Expand...< / summary > < a href = "https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits" > https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv011" > https://avd.aquasec.com/appshield/ksv011< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-grist' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv012" > https://avd.aquasec.com/appshield/ksv012< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' RELEASE-NAME-grist' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv014" > https://avd.aquasec.com/appshield/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | < details > < summary > Expand...< / summary > When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' resources.requests.cpu' < / details > | < details > < summary > Expand...< / summary > < a href = "https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits" > https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv015" > https://avd.aquasec.com/appshield/ksv015< / a > < br > < / details > |
| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW | < details > < summary > Expand...< / summary > When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' resources.requests.memory' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-resources-limits-memory/" > https://kubesec.io/basics/containers-resources-limits-memory/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv016" > https://avd.aquasec.com/appshield/ksv016< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv017" > https://avd.aquasec.com/appshield/ksv017< / a > < br > < / details > |
| Kubernetes Security Check | KSV018 | Memory not limited | LOW | < details > < summary > Expand...< / summary > Enforcing memory limits prevents DoS via resource exhaustion. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' resources.limits.memory' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-resources-limits-memory/" > https://kubesec.io/basics/containers-resources-limits-memory/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv018" > https://avd.aquasec.com/appshield/ksv018< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-grist' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv020" > https://avd.aquasec.com/appshield/ksv020< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-grist' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' autopermissions' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
2022-03-02 12:51:49 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' hostpatch' of Deployment ' RELEASE-NAME-grist' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv021" > https://avd.aquasec.com/appshield/ksv021< / a > < br > < / details > |
| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM | < details > < summary > Expand...< / summary > HostPath volumes must be forbidden. < br > < hr > < br > Deployment ' RELEASE-NAME-grist' should not set ' spec.template.volumes.hostPath' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv023" > https://avd.aquasec.com/appshield/ksv023< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root primary or supplementary GID. < br > < hr > < br > Deployment ' RELEASE-NAME-grist' should set ' spec.securityContext.runAsGroup' , ' spec.securityContext.supplementalGroups[*]' and ' spec.securityContext.fsGroup' to integer greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/appshield/ksv029" > https://avd.aquasec.com/appshield/ksv029< / a > < br > < / details > |
## Containers
##### Detected Containers
2022-03-26 15:30:42 +00:00
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
2022-05-22 06:12:12 +00:00
tccr.io/truecharts/grist:v0.7.9@sha256:2992e73543345888c4495bf000bdfdd4584fc2048de38a98649c6205e79bb63c
2022-02-27 23:06:38 +00:00
##### Scan Results
2022-03-26 15:30:42 +00:00
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
**alpine**
2022-02-28 11:31:46 +00:00
2022-03-30 20:23:21 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-05-10 21:17:41 +00:00
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-28391" > https://access.redhat.com/security/cve/CVE-2022-28391< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-05-10 21:17:41 +00:00
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-28391" > https://access.redhat.com/security/cve/CVE-2022-28391< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/May/33" > http://seclists.org/fulldisclosure/2022/May/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/38" > http://seclists.org/fulldisclosure/2022/May/38< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-2201.html" > https://errata.almalinux.org/8/ALSA-2022-2201.html< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4" > https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" > https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5< / a > < br > < a href = "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ" > https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-25032.html" > https://linux.oracle.com/cve/CVE-2018-25032.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-2213.html" > https://linux.oracle.com/errata/ELSA-2022-2213.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" > https://nvd.nist.gov/vuln/detail/CVE-2018-25032< / a > < br > < a href = "https://support.apple.com/kb/HT213255" > https://support.apple.com/kb/HT213255< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://support.apple.com/kb/HT213257" > https://support.apple.com/kb/HT213257< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5359-1" > https://ubuntu.com/security/notices/USN-5359-1< / a > < br > < a href = "https://www.d
2022-03-26 15:30:42 +00:00
#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
**alpine**
2022-02-28 11:31:46 +00:00
2022-03-30 20:23:21 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-05-10 21:17:41 +00:00
| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-28391" > https://access.redhat.com/security/cve/CVE-2022-28391< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-22576" > https://access.redhat.com/security/cve/CVE-2022-22576< / a > < br > < a href = "https://curl.se/docs/CVE-2022-22576.html" > https://curl.se/docs/CVE-2022-22576.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27774" > https://access.redhat.com/security/cve/CVE-2022-27774< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27774.html" > https://curl.se/docs/CVE-2022-27774.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27776" > https://access.redhat.com/security/cve/CVE-2022-27776< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27776.html" > https://curl.se/docs/CVE-2022-27776.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-27775" > https://access.redhat.com/security/cve/CVE-2022-27775< / a > < br > < a href = "https://curl.se/docs/CVE-2022-27775.html" > https://curl.se/docs/CVE-2022-27775.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5397-1" > https://ubuntu.com/security/notices/USN-5397-1< / a > < br > < / details > |
2022-05-10 21:17:41 +00:00
| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-28391" > https://access.redhat.com/security/cve/CVE-2022-28391< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch< / a > < br > < a href = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" > https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch< / a > < br > < a href = "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" > https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-28391" > https://nvd.nist.gov/vuln/detail/CVE-2022-28391< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/May/33" > http://seclists.org/fulldisclosure/2022/May/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/38" > http://seclists.org/fulldisclosure/2022/May/38< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/25/2" > http://www.openwall.com/lists/oss-security/2022/03/25/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/03/26/1" > http://www.openwall.com/lists/oss-security/2022/03/26/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-25032" > https://access.redhat.com/security/cve/CVE-2018-25032< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-2201.html" > https://errata.almalinux.org/8/ALSA-2022-2201.html< / a > < br > < a href = "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" > https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531< / a > < br > < a href = "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" > https://github.com/madler/zlib/compare/v1.2.11...v1.2.12< / a > < br > < a href = "https://github.com/madler/zlib/issues/605" > https://github.com/madler/zlib/issues/605< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4" > https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4< / a > < br > < a href = "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" > https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5< / a > < br > < a href = "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ" > https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-25032.html" > https://linux.oracle.com/cve/CVE-2018-25032.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-2213.html" > https://linux.oracle.com/errata/ELSA-2022-2213.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" > https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" > https://nvd.nist.gov/vuln/detail/CVE-2018-25032< / a > < br > < a href = "https://support.apple.com/kb/HT213255" > https://support.apple.com/kb/HT213255< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://support.apple.com/kb/HT213257" > https://support.apple.com/kb/HT213257< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-1" > https://ubuntu.com/security/notices/USN-5355-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5355-2" > https://ubuntu.com/security/notices/USN-5355-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5359-1" > https://ubuntu.com/security/notices/USN-5359-1< / a > < br > < a href = "https://www.d
2022-02-27 23:06:38 +00:00
2022-05-22 06:12:12 +00:00
#### Container: tccr.io/truecharts/grist:v0.7.9@sha256:2992e73543345888c4495bf000bdfdd4584fc2048de38a98649c6205e79bb63c (debian 10.12)
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
**debian**
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| apt | CVE-2011-3374 | LOW | 1.8.2.3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2011-3374" > https://access.redhat.com/security/cve/cve-2011-3374< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480< / a > < br > < a href = "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html" > https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html< / a > < br > < a href = "https://seclists.org/fulldisclosure/2011/Sep/221" > https://seclists.org/fulldisclosure/2011/Sep/221< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2011-3374" > https://security-tracker.debian.org/tracker/CVE-2011-3374< / a > < br > < a href = "https://snyk.io/vuln/SNYK-LINUX-APT-116518" > https://snyk.io/vuln/SNYK-LINUX-APT-116518< / a > < br > < a href = "https://ubuntu.com/security/CVE-2011-3374" > https://ubuntu.com/security/CVE-2011-3374< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| bash | CVE-2019-18276 | LOW | 5.0-4 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html" > http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-18276" > https://access.redhat.com/security/cve/CVE-2019-18276< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276< / a > < br > < a href = "https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff" > https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-18276.html" > https://linux.oracle.com/cve/CVE-2019-18276.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1679.html" > https://linux.oracle.com/errata/ELSA-2021-1679.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-18276" > https://nvd.nist.gov/vuln/detail/CVE-2019-18276< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-34" > https://security.gentoo.org/glsa/202105-34< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200430-0003/" > https://security.netapp.com/advisory/ntap-20200430-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5380-1" > https://ubuntu.com/security/notices/USN-5380-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.youtube.com/watch?v=-wGtxJ8opa8" > https://www.youtube.com/watch?v=-wGtxJ8opa8< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| coreutils | CVE-2016-2781 | LOW | 8.30-3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| coreutils | CVE-2017-18018 | LOW | 8.30-3 | | < details > < summary > Expand...< / summary > < a href = "http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html" > http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-18018" > https://access.redhat.com/security/cve/CVE-2017-18018< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| e2fsprogs | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-12886" > https://access.redhat.com/security/cve/CVE-2018-12886< / a > < br > < a href = "https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup" > https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379& view=markup< / a > < br > < a href = "https://www.gnu.org/software/gcc/gcc-8/changes.html" > https://www.gnu.org/software/gcc/gcc-8/changes.html< / a > < br > < / details > |
| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-15847" > https://access.redhat.com/security/cve/CVE-2019-15847< / a > < br > < a href = "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481" > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-15847.html" > https://linux.oracle.com/cve/CVE-2019-15847.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1864.html" > https://linux.oracle.com/errata/ELSA-2020-1864.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-15847" > https://nvd.nist.gov/vuln/detail/CVE-2019-15847< / a > < br > < / details > |
| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-14855" > https://access.redhat.com/security/cve/CVE-2019-14855< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855< / a > < br > < a href = "https://dev.gnupg.org/T4755" > https://dev.gnupg.org/T4755< / a > < br > < a href = "https://eprint.iacr.org/2020/014.pdf" > https://eprint.iacr.org/2020/014.pdf< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html" > https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html< / a > < br > < a href = "https://rwc.iacr.org/2020/slides/Leurent.pdf" > https://rwc.iacr.org/2020/slides/Leurent.pdf< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4516-1" > https://ubuntu.com/security/notices/USN-4516-1< / a > < br > < a href = "https://usn.ubuntu.com/4516-1/" > https://usn.ubuntu.com/4516-1/< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/cve-2011-3374" > https://access.redhat.com/security/cve/cve-2011-3374< / a > < br > < a href = "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480" > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480< / a > < br > < a href = "https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html" > https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html< / a > < br > < a href = "https://seclists.org/fulldisclosure/2011/Sep/221" > https://seclists.org/fulldisclosure/2011/Sep/221< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2011-3374" > https://security-tracker.debian.org/tracker/CVE-2011-3374< / a > < br > < a href = "https://snyk.io/vuln/SNYK-LINUX-APT-116518" > https://snyk.io/vuln/SNYK-LINUX-APT-116518< / a > < br > < a href = "https://ubuntu.com/security/CVE-2011-3374" > https://ubuntu.com/security/CVE-2011-3374< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-33574" > https://access.redhat.com/security/cve/CVE-2021-33574< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33574.html" > https://linux.oracle.com/cve/CVE-2021-33574.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33574" > https://nvd.nist.gov/vuln/detail/CVE-2021-33574< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210629-0005/" > https://security.netapp.com/advisory/ntap-20210629-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35942" > https://access.redhat.com/security/cve/CVE-2021-35942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-35942" > https://nvd.nist.gov/vuln/detail/CVE-2021-35942< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23218" > https://access.redhat.com/security/cve/CVE-2022-23218< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23218.html" > https://linux.oracle.com/cve/CVE-2022-23218.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9421.html" > https://linux.oracle.com/errata/ELSA-2022-9421.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23218" > https://nvd.nist.gov/vuln/detail/CVE-2022-23218< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" > https://sourceware.org/bugzilla/show_bug.cgi?id=28768< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23219" > https://access.redhat.com/security/cve/CVE-2022-23219< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23219.html" > https://linux.oracle.com/cve/CVE-2022-23219.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9421.html" > https://linux.oracle.com/errata/ELSA-2022-9421.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23219" > https://nvd.nist.gov/vuln/detail/CVE-2022-23219< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" > https://sourceware.org/bugzilla/show_bug.cgi?id=22542< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-1751" > https://access.redhat.com/security/cve/CVE-2020-1751< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-1751.html" > https://linux.oracle.com/cve/CVE-2020-1751.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4444.html" > https://linux.oracle.com/errata/ELSA-2020-4444.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-1751" > https://nvd.nist.gov/vuln/detail/CVE-2020-1751< / a > < br > < a href = "https://security.gentoo.org/glsa/202006-04" > https://security.gentoo.org/glsa/202006-04< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200430-0002/" > https://security.netapp.com/advisory/ntap-20200430-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25423" > https://sourceware.org/bugzilla/show_bug.cgi?id=25423< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-1752" > https://access.redhat.com/security/cve/CVE-2020-1752< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-1752.html" > https://linux.oracle.com/cve/CVE-2020-1752.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4444.html" > https://linux.oracle.com/errata/ELSA-2020-4444.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-1752" > https://nvd.nist.gov/vuln/detail/CVE-2020-1752< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200511-0005/" > https://security.netapp.com/advisory/ntap-20200511-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25414" > https://sourceware.org/bugzilla/show_bug.cgi?id=25414< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3326" > https://access.redhat.com/security/cve/CVE-2021-3326< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3326" > https://nvd.nist.gov/vuln/detail/CVE-2021-3326< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-25013" > https://access.redhat.com/security/cve/CVE-2019-25013< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-25013" > https://nvd.nist.gov/vuln/detail/CVE-2019-25013< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a31
2022-04-09 08:44:17 +00:00
| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html" > http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-10029" > https://access.redhat.com/security/cve/CVE-2020-10029< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-10029.html" > https://linux.oracle.com/cve/CVE-2020-10029.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0348.html" > https://linux.oracle.com/errata/ELSA-2021-0348.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-10029" > https://nvd.nist.gov/vuln/detail/CVE-2020-10029< / a > < br > < a href = "https://security.gentoo.org/glsa/202006-04" > https://security.gentoo.org/glsa/202006-04< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200327-0003/" > https://security.netapp.com/advisory/ntap-20200327-0003/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25487" > https://sourceware.org/bugzilla/show_bug.cgi?id=25487< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27618" > https://access.redhat.com/security/cve/CVE-2020-27618< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-27618" > https://nvd.nist.gov/vuln/detail/CVE-2020-27618< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10228" > https://access.redhat.com/security/cve/CVE-2016-10228< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19126" > https://access.redhat.com/security/cve/CVE-2019-19126< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-19126.html" > https://linux.oracle.com/cve/CVE-2019-19126.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-3861.html" > https://linux.oracle.com/errata/ELSA-2020-3861.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-19126" > https://nvd.nist.gov/vuln/detail/CVE-2019-19126< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25204" > https://sourceware.org/bugzilla/show_bug.cgi?id=25204< / a > < br > < a href = "https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html" > https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
2022-04-12 17:24:36 +00:00
| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-6096" > https://access.redhat.com/security/cve/CVE-2020-6096< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" > https://nvd.nist.gov/vuln/detail/CVE-2020-6096< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
2022-05-24 07:26:11 +00:00
| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-27645" > https://access.redhat.com/security/cve/CVE-2021-27645< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27645.html" > https://linux.oracle.com/cve/CVE-2021-27645.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27462" > https://sourceware.org/bugzilla/show_bug.cgi?id=27462< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-33574" > https://access.redhat.com/security/cve/CVE-2021-33574< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33574.html" > https://linux.oracle.com/cve/CVE-2021-33574.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33574" > https://nvd.nist.gov/vuln/detail/CVE-2021-33574< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210629-0005/" > https://security.netapp.com/advisory/ntap-20210629-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1" > https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-35942" > https://access.redhat.com/security/cve/CVE-2021-35942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-35942.html" > https://linux.oracle.com/cve/CVE-2021-35942.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-35942" > https://nvd.nist.gov/vuln/detail/CVE-2021-35942< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210827-0005/" > https://security.netapp.com/advisory/ntap-20210827-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28011" > https://sourceware.org/bugzilla/show_bug.cgi?id=28011< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c" > https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c< / a > < br > < a href = "https://sourceware.org/glibc/wiki/Security%20Exceptions" > https://sourceware.org/glibc/wiki/Security%20Exceptions< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23218" > https://access.redhat.com/security/cve/CVE-2022-23218< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23218.html" > https://linux.oracle.com/cve/CVE-2022-23218.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9421.html" > https://linux.oracle.com/errata/ELSA-2022-9421.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23218" > https://nvd.nist.gov/vuln/detail/CVE-2022-23218< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=28768" > https://sourceware.org/bugzilla/show_bug.cgi?id=28768< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-23219" > https://access.redhat.com/security/cve/CVE-2022-23219< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-23219.html" > https://linux.oracle.com/cve/CVE-2022-23219.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9421.html" > https://linux.oracle.com/errata/ELSA-2022-9421.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-23219" > https://nvd.nist.gov/vuln/detail/CVE-2022-23219< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22542" > https://sourceware.org/bugzilla/show_bug.cgi?id=22542< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-1751" > https://access.redhat.com/security/cve/CVE-2020-1751< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-1751.html" > https://linux.oracle.com/cve/CVE-2020-1751.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4444.html" > https://linux.oracle.com/errata/ELSA-2020-4444.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-1751" > https://nvd.nist.gov/vuln/detail/CVE-2020-1751< / a > < br > < a href = "https://security.gentoo.org/glsa/202006-04" > https://security.gentoo.org/glsa/202006-04< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200430-0002/" > https://security.netapp.com/advisory/ntap-20200430-0002/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25423" > https://sourceware.org/bugzilla/show_bug.cgi?id=25423< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-1752" > https://access.redhat.com/security/cve/CVE-2020-1752< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-1752.html" > https://linux.oracle.com/cve/CVE-2020-1752.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4444.html" > https://linux.oracle.com/errata/ELSA-2020-4444.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-1752" > https://nvd.nist.gov/vuln/detail/CVE-2020-1752< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200511-0005/" > https://security.netapp.com/advisory/ntap-20200511-0005/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25414" > https://sourceware.org/bugzilla/show_bug.cgi?id=25414< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/01/28/2" > http://www.openwall.com/lists/oss-security/2021/01/28/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3326" > https://access.redhat.com/security/cve/CVE-2021-3326< / a > < br > < a href = "https://bugs.chromium.org/p/project-zero/issues/detail?id=2146" > https://bugs.chromium.org/p/project-zero/issues/detail?id=2146< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3326.html" > https://linux.oracle.com/cve/CVE-2021-3326.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3326" > https://nvd.nist.gov/vuln/detail/CVE-2021-3326< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210304-0007/" > https://security.netapp.com/advisory/ntap-20210304-0007/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27256" > https://sourceware.org/bugzilla/show_bug.cgi?id=27256< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888" > https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888< / a > < br > < a href = "https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html" > https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3999" > https://access.redhat.com/security/cve/CVE-2021-3999< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3999.html" > https://linux.oracle.com/cve/CVE-2021-3999.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9234.html" > https://linux.oracle.com/errata/ELSA-2022-9234.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-2" > https://ubuntu.com/security/notices/USN-5310-2< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/24/4" > https://www.openwall.com/lists/oss-security/2022/01/24/4< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-25013" > https://access.redhat.com/security/cve/CVE-2019-25013< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-25013.html" > https://linux.oracle.com/cve/CVE-2019-25013.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E" > https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E" > https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-25013" > https://nvd.nist.gov/vuln/detail/CVE-2019-25013< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210205-0004/" > https://security.netapp.com/advisory/ntap-20210205-0004/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24973" > https://sourceware.org/bugzilla/show_bug.cgi?id=24973< / a > < br > < a href = "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c
2022-04-09 08:44:17 +00:00
| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html" > http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-10029" > https://access.redhat.com/security/cve/CVE-2020-10029< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-10029.html" > https://linux.oracle.com/cve/CVE-2020-10029.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0348.html" > https://linux.oracle.com/errata/ELSA-2021-0348.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-10029" > https://nvd.nist.gov/vuln/detail/CVE-2020-10029< / a > < br > < a href = "https://security.gentoo.org/glsa/202006-04" > https://security.gentoo.org/glsa/202006-04< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200327-0003/" > https://security.netapp.com/advisory/ntap-20200327-0003/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25487" > https://sourceware.org/bugzilla/show_bug.cgi?id=25487< / a > < br > < a href = "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f" > https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-27618" > https://access.redhat.com/security/cve/CVE-2020-27618< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-27618.html" > https://linux.oracle.com/cve/CVE-2020-27618.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-27618" > https://nvd.nist.gov/vuln/detail/CVE-2020-27618< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210401-0006/" > https://security.netapp.com/advisory/ntap-20210401-0006/< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://cxib.net/stuff/glob-0day.c" > http://cxib.net/stuff/glob-0day.c< / a > < br > < a href = "http://securityreason.com/achievement_securityalert/89" > http://securityreason.com/achievement_securityalert/89< / a > < br > < a href = "http://securityreason.com/exploitalert/9223" > http://securityreason.com/exploitalert/9223< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2010-4756" > https://access.redhat.com/security/cve/CVE-2010-4756< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=681681" > https://bugzilla.redhat.com/show_bug.cgi?id=681681< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2010-4756" > https://nvd.nist.gov/vuln/detail/CVE-2010-4756< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/03/01/10" > http://openwall.com/lists/oss-security/2017/03/01/10< / a > < br > < a href = "http://www.securityfocus.com/bid/96525" > http://www.securityfocus.com/bid/96525< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10228" > https://access.redhat.com/security/cve/CVE-2016-10228< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10228.html" > https://linux.oracle.com/cve/CVE-2016-10228.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9344.html" > https://linux.oracle.com/errata/ELSA-2021-9344.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21" > https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=26224" > https://sourceware.org/bugzilla/show_bug.cgi?id=26224< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/107160" > http://www.securityfocus.com/bid/107160< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20796" > https://access.redhat.com/security/cve/CVE-2018-20796< / a > < br > < a href = "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141" > https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html" > https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20796" > https://nvd.nist.gov/vuln/detail/CVE-2018-20796< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190315-0002/" > https://security.netapp.com/advisory/ntap-20190315-0002/< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010022" > https://access.redhat.com/security/cve/CVE-2019-1010022< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010022" > https://security-tracker.debian.org/tracker/CVE-2019-1010022< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3" > https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010022" > https://ubuntu.com/security/CVE-2019-1010022< / a > < br > < / details > |
| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109167" > http://www.securityfocus.com/bid/109167< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010023" > https://access.redhat.com/security/cve/CVE-2019-1010023< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010023" > https://security-tracker.debian.org/tracker/CVE-2019-1010023< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22851" > https://sourceware.org/bugzilla/show_bug.cgi?id=22851< / a > < br > < a href = "https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K11932200?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010023" > https://ubuntu.com/security/CVE-2019-1010023< / a > < br > < / details > |
| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/109162" > http://www.securityfocus.com/bid/109162< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010024" > https://access.redhat.com/security/cve/CVE-2019-1010024< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010024" > https://security-tracker.debian.org/tracker/CVE-2019-1010024< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22852" > https://sourceware.org/bugzilla/show_bug.cgi?id=22852< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010024" > https://ubuntu.com/security/CVE-2019-1010024< / a > < br > < / details > |
| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010025" > https://access.redhat.com/security/cve/CVE-2019-1010025< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-1010025" > https://security-tracker.debian.org/tracker/CVE-2019-1010025< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=22853" > https://sourceware.org/bugzilla/show_bug.cgi?id=22853< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097" > https://support.f5.com/csp/article/K06046097< / a > < br > < a href = "https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K06046097?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://ubuntu.com/security/CVE-2019-1010025" > https://ubuntu.com/security/CVE-2019-1010025< / a > < br > < / details > |
| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19126" > https://access.redhat.com/security/cve/CVE-2019-19126< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-19126.html" > https://linux.oracle.com/cve/CVE-2019-19126.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-3861.html" > https://linux.oracle.com/errata/ELSA-2020-3861.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-19126" > https://nvd.nist.gov/vuln/detail/CVE-2019-19126< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25204" > https://sourceware.org/bugzilla/show_bug.cgi?id=25204< / a > < br > < a href = "https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html" > https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4416-1" > https://ubuntu.com/security/notices/USN-4416-1< / a > < br > < a href = "https://usn.ubuntu.com/4416-1/" > https://usn.ubuntu.com/4416-1/< / a > < br > < / details > |
2022-04-12 17:24:36 +00:00
| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-9192" > https://access.redhat.com/security/cve/CVE-2019-9192< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-9192" > https://nvd.nist.gov/vuln/detail/CVE-2019-9192< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=24269" > https://sourceware.org/bugzilla/show_bug.cgi?id=24269< / a > < br > < a href = "https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K26346590?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-6096" > https://access.redhat.com/security/cve/CVE-2020-6096< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-6096" > https://nvd.nist.gov/vuln/detail/CVE-2020-6096< / a > < br > < a href = "https://security.gentoo.org/glsa/202101-20" > https://security.gentoo.org/glsa/202101-20< / a > < br > < a href = "https://sourceware.org/bugzilla/attachment.cgi?id=12334" > https://sourceware.org/bugzilla/attachment.cgi?id=12334< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=25620" > https://sourceware.org/bugzilla/show_bug.cgi?id=25620< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4954-1" > https://ubuntu.com/security/notices/USN-4954-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < a href = "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019" > https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019< / a > < br > < / details > |
2022-05-24 07:26:11 +00:00
| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-27645" > https://access.redhat.com/security/cve/CVE-2021-27645< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27645.html" > https://linux.oracle.com/cve/CVE-2021-27645.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-9560.html" > https://linux.oracle.com/errata/ELSA-2021-9560.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-07" > https://security.gentoo.org/glsa/202107-07< / a > < br > < a href = "https://sourceware.org/bugzilla/show_bug.cgi?id=27462" > https://sourceware.org/bugzilla/show_bug.cgi?id=27462< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5310-1" > https://ubuntu.com/security/notices/USN-5310-1< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-8457" > https://access.redhat.com/security/cve/CVE-2019-8457< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457< / a > < br > < a href = "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" > https://kc.mcafee.com/corporate/index?page=content& id=SB10365< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-8457.html" > https://linux.oracle.com/cve/CVE-2019-8457.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1810.html" > https://linux.oracle.com/errata/ELSA-2020-1810.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190606-0002/" > https://security.netapp.com/advisory/ntap-20190606-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4004-1" > https://ubuntu.com/security/notices/USN-4004-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4004-2" > https://ubuntu.com/security/notices/USN-4004-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4019-1" > https://ubuntu.com/security/notices/USN-4019-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4019-2" > https://ubuntu.com/security/notices/USN-4019-2< / a > < br > < a href = "https://usn.ubuntu.com/4004-1/" > https://usn.ubuntu.com/4004-1/< / a > < br > < a href = "https://usn.ubuntu.com/4004-2/" > https://usn.ubuntu.com/4004-2/< / a > < br > < a href = "https://usn.ubuntu.com/4019-1/" > https://usn.ubuntu.com/4019-1/< / a > < br > < a href = "https://usn.ubuntu.com/4019-2/" > https://usn.ubuntu.com/4019-2/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2020.html" > https://www.oracle.com/security-alerts/cpujan2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < a href = "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" > https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html< / a > < br > < a href = "https://www.sqlite.org/releaselog/3_28_0.html" > https://www.sqlite.org/releaselog/3_28_0.html< / a > < br > < a href = "https://www.sqlite.org/src/info/90acdbfce9c08858" > https://www.sqlite.org/src/info/90acdbfce9c08858< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u4 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2013/02/22/3" > http://openwall.com/lists/oss-security/2013/02/22/3< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Oct/61" > http://seclists.org/fulldisclosure/2021/Oct/61< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Oct/62" > http://seclists.org/fulldisclosure/2021/Oct/62< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Oct/63" > http://seclists.org/fulldisclosure/2021/Oct/63< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Sep/33" > http://seclists.org/fulldisclosure/2021/Sep/33< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Sep/34" > http://seclists.org/fulldisclosure/2021/Sep/34< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Sep/35" > http://seclists.org/fulldisclosure/2021/Sep/35< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Sep/38" > http://seclists.org/fulldisclosure/2021/Sep/38< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Sep/39" > http://seclists.org/fulldisclosure/2021/Sep/39< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Sep/40" > http://seclists.org/fulldisclosure/2021/Sep/40< / a > < br > < a href = "http://securitytracker.com/id?1028213" > http://securitytracker.com/id?1028213< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/04/12/6" > http://www.openwall.com/lists/oss-security/2013/04/12/6< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/10/07/4" > http://www.openwall.com/lists/oss-security/2021/10/07/4< / a > < br > < a href = "http://www.osvdb.org/90634" > http://www.osvdb.org/90634< / a > < br > < a href = "http://www.securityfocus.com/bid/58233" > http://www.securityfocus.com/bid/58233< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-0340" > https://access.redhat.com/security/cve/CVE-2013-0340< / a > < br > < a href = "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E" > https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E" > https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2013-0340" > https://nvd.nist.gov/vuln/detail/CVE-2013-0340< / a > < br > < a href = "https://security.gentoo.org/glsa/201701-21" > https://security.gentoo.org/glsa/201701-21< / a > < br > < a href = "https://support.apple.com/kb/HT212804" > https://support.apple.com/kb/HT212804< / a > < br > < a href = "https://support.apple.com/kb/HT212805" > https://support.apple.com/kb/HT212805< / a > < br > < a href = "https://support.apple.com/kb/HT212807" > https://support.apple.com/kb/HT212807< / a > < br > < a href = "https://support.apple.com/kb/HT212814" > https://support.apple.com/kb/HT212814< / a > < br > < a href = "https://support.apple.com/kb/HT212815" > https://support.apple.com/kb/HT212815< / a > < br > < a href = "https://support.apple.com/kb/HT212819" > https://support.apple.com/kb/HT212819< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libext2fs2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-12886" > https://access.redhat.com/security/cve/CVE-2018-12886< / a > < br > < a href = "https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup" > https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379& view=markup< / a > < br > < a href = "https://www.gnu.org/software/gcc/gcc-8/changes.html" > https://www.gnu.org/software/gcc/gcc-8/changes.html< / a > < br > < / details > |
| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-15847" > https://access.redhat.com/security/cve/CVE-2019-15847< / a > < br > < a href = "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481" > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-15847.html" > https://linux.oracle.com/cve/CVE-2019-15847.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1864.html" > https://linux.oracle.com/errata/ELSA-2020-1864.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-15847" > https://nvd.nist.gov/vuln/detail/CVE-2019-15847< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-33560" > https://access.redhat.com/security/cve/CVE-2021-33560< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560< / a > < br > < a href = "https://dev.gnupg.org/T5305" > https://dev.gnupg.org/T5305< / a > < br > < a href = "https://dev.gnupg.org/T5328" > https://dev.gnupg.org/T5328< / a > < br > < a href = "https://dev.gnupg.org/T5466" > https://dev.gnupg.org/T5466< / a > < br > < a href = "https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61" > https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61< / a > < br > < a href = "https://eprint.iacr.org/2021/923" > https://eprint.iacr.org/2021/923< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4409.html" > https://errata.almalinux.org/8/ALSA-2021-4409.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33560.html" > https://linux.oracle.com/cve/CVE-2021-33560.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9263.html" > https://linux.oracle.com/errata/ELSA-2022-9263.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html" > https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33560" > https://nvd.nist.gov/vuln/detail/CVE-2021-33560< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5080-1" > https://ubuntu.com/security/notices/USN-5080-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5080-2" > https://ubuntu.com/security/notices/USN-5080-2< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html" > http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html" > http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2019/10/02/2" > http://www.openwall.com/lists/oss-security/2019/10/02/2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-13627" > https://access.redhat.com/security/cve/CVE-2019-13627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627< / a > < br > < a href = "https://dev.gnupg.org/T4683" > https://dev.gnupg.org/T4683< / a > < br > < a href = "https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5" > https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-13627.html" > https://linux.oracle.com/cve/CVE-2019-13627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4482.html" > https://linux.oracle.com/errata/ELSA-2020-4482.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html" > https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html" > https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html< / a > < br > < a href = "https://minerva.crocs.fi.muni.cz/" > https://minerva.crocs.fi.muni.cz/< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2019-13627" > https://security-tracker.debian.org/tracker/CVE-2019-13627< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-32" > https://security.gentoo.org/glsa/202003-32< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4236-1" > https://ubuntu.com/security/notices/USN-4236-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4236-2" > https://ubuntu.com/security/notices/USN-4236-2< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4236-3" > https://ubuntu.com/security/notices/USN-4236-3< / a > < br > < a href = "https://usn.ubuntu.com/4236-1/" > https://usn.ubuntu.com/4236-1/< / a > < br > < a href = "https://usn.ubuntu.com/4236-2/" > https://usn.ubuntu.com/4236-2/< / a > < br > < a href = "https://usn.ubuntu.com/4236-3/" > https://usn.ubuntu.com/4236-3/< / a > < br > < / details > |
| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-6829" > https://access.redhat.com/security/cve/CVE-2018-6829< / a > < br > < a href = "https://github.com/weikengchen/attack-on-libgcrypt-elgamal" > https://github.com/weikengchen/attack-on-libgcrypt-elgamal< / a > < br > < a href = "https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki" > https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki< / a > < br > < a href = "https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html" > https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2020.html" > https://www.oracle.com/security-alerts/cpujan2020.html< / a > < br > < / details > |
| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-4209" > https://access.redhat.com/security/cve/CVE-2021-4209< / a > < br > < / details > |
| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | | < details > < summary > Expand...< / summary > < a href = "http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/" > http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/< / a > < br > < a href = "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" > http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/< / a > < br > < a href = "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" > http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx< / a > < br > < a href = "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" > http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx< / a > < br > < a href = "http://curl.haxx.se/docs/adv_20120124B.html" > http://curl.haxx.se/docs/adv_20120124B.html< / a > < br > < a href = "http://downloads.asterisk.org/pub/security/AST-2016-001.html" > http://downloads.asterisk.org/pub/security/AST-2016-001.html< / a > < br > < a href = "http://ekoparty.org/2011/juliano-rizzo.php" > http://ekoparty.org/2011/juliano-rizzo.php< / a > < br > < a href = "http://eprint.iacr.org/2004/111" > http://eprint.iacr.org/2004/111< / a > < br > < a href = "http://eprint.iacr.org/2006/136" > http://eprint.iacr.org/2006/136< / a > < br > < a href = "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" > http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html< / a > < br > < a href = "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" > http://isc.sans.edu/diary/SSL+TLS+part+3+/11635< / a > < br > < a href = "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" > http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" > http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" > http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" > http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" > http://lists.apple.com/archives/security-announce/2012/May/msg00001.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" > http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html< / a > < br > < a href = "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" > http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" > http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" > http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" > http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" > http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=132750579901589&w=2" > http://marc.info/?l=bugtraq& m=132750579901589& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=132872385320240&w=2" > http://marc.info/?l=bugtraq& m=132872385320240& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=133365109612558&w=2" > http://marc.info/?l=bugtraq& m=133365109612558& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=133728004526190&w=2" > http://marc.info/?l=bugtraq& m=133728004526190& w=2< / a > < br > < a href = "http://marc.info/?l=bugtraq&m=1342548
2022-02-27 23:06:38 +00:00
| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html" > http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html" > http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290< / a > < br > < a href = "https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5" > https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5< / a > < br > < a href = "https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de" > https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de< / a > < br > < a href = "https://gitlab.com/libidn/libidn2/merge_requests/71" > https://gitlab.com/libidn/libidn2/merge_requests/71< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/< / a > < br > < a href = "https://security.gentoo.org/glsa/202003-63" > https://security.gentoo.org/glsa/202003-63< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4168-1" > https://ubuntu.com/security/notices/USN-4168-1< / a > < br > < a href = "https://usn.ubuntu.com/4168-1/" > https://usn.ubuntu.com/4168-1/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-17543" > https://access.redhat.com/security/cve/CVE-2019-17543< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941< / a > < br > < a href = "https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2" > https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2< / a > < br > < a href = "https://github.com/lz4/lz4/issues/801" > https://github.com/lz4/lz4/issues/801< / a > < br > < a href = "https://github.com/lz4/lz4/pull/756" > https://github.com/lz4/lz4/pull/756< / a > < br > < a href = "https://github.com/lz4/lz4/pull/760" > https://github.com/lz4/lz4/pull/760< / a > < br > < a href = "https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E" > https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E" > https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E" > https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E" > https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E" > https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E" > https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E" > https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E" > https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E" > https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < / details > |
| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < / details > |
2022-04-09 08:44:17 +00:00
| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/" > https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14155" > https://access.redhat.com/security/cve/CVE-2020-14155< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4373.html" > https://errata.almalinux.org/8/ALSA-2021-4373.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-14155.html" > https://linux.oracle.com/cve/CVE-2020-14155.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14155" > https://nvd.nist.gov/vuln/detail/CVE-2020-14155< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5425-1" > https://ubuntu.com/security/notices/USN-5425-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html" > http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2018/Dec/33" > http://seclists.org/fulldisclosure/2018/Dec/33< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/11" > http://www.openwall.com/lists/oss-security/2017/11/01/11< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/3" > http://www.openwall.com/lists/oss-security/2017/11/01/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/7" > http://www.openwall.com/lists/oss-security/2017/11/01/7< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2017/11/01/8" > http://www.openwall.com/lists/oss-security/2017/11/01/8< / a > < br > < a href = "http://www.securityfocus.com/bid/101688" > http://www.securityfocus.com/bid/101688< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-16231" > https://access.redhat.com/security/cve/CVE-2017-16231< / a > < br > < a href = "https://bugs.exim.org/show_bug.cgi?id=2047" > https://bugs.exim.org/show_bug.cgi?id=2047< / a > < br > < / details > |
| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/97067" > http://www.securityfocus.com/bid/97067< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2486" > https://access.redhat.com/errata/RHSA-2018:2486< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7245" > https://access.redhat.com/security/cve/CVE-2017-7245< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" > https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/< / a > < br > < a href = "https://security.gentoo.org/glsa/201710-25" > https://security.gentoo.org/glsa/201710-25< / a > < br > < / details > |
| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/97067" > http://www.securityfocus.com/bid/97067< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:2486" > https://access.redhat.com/errata/RHSA-2018:2486< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-7246" > https://access.redhat.com/security/cve/CVE-2017-7246< / a > < br > < a href = "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" > https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/< / a > < br > < a href = "https://security.gentoo.org/glsa/201710-25" > https://security.gentoo.org/glsa/201710-25< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2021/Feb/14" > http://seclists.org/fulldisclosure/2021/Feb/14< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20838" > https://access.redhat.com/security/cve/CVE-2019-20838< / a > < br > < a href = "https://bugs.gentoo.org/717920" > https://bugs.gentoo.org/717920< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4373.html" > https://errata.almalinux.org/8/ALSA-2021-4373.html< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20838.html" > https://linux.oracle.com/cve/CVE-2019-20838.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4373.html" > https://linux.oracle.com/errata/ELSA-2021-4373.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20838" > https://nvd.nist.gov/vuln/detail/CVE-2019-20838< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT212147" > https://support.apple.com/kb/HT212147< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5425-1" > https://ubuntu.com/security/notices/USN-5425-1< / a > < br > < a href = "https://www.pcre.org/original/changelog.txt" > https://www.pcre.org/original/changelog.txt< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html< / a > < br > < a href = "http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html" > http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3624" > https://access.redhat.com/errata/RHSA-2019:3624< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-9893" > https://access.redhat.com/security/cve/CVE-2019-9893< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893< / a > < br > < a href = "https://github.com/seccomp/libseccomp/issues/139" > https://github.com/seccomp/libseccomp/issues/139< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-9893.html" > https://linux.oracle.com/cve/CVE-2019-9893.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2019-3624.html" > https://linux.oracle.com/errata/ELSA-2019-3624.html< / a > < br > < a href = "https://seclists.org/oss-sec/2019/q1/179" > https://seclists.org/oss-sec/2019/q1/179< / a > < br > < a href = "https://security.gentoo.org/glsa/201904-18" > https://security.gentoo.org/glsa/201904-18< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4001-1" > https://ubuntu.com/security/notices/USN-4001-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4001-2" > https://ubuntu.com/security/notices/USN-4001-2< / a > < br > < a href = "https://usn.ubuntu.com/4001-1/" > https://usn.ubuntu.com/4001-1/< / a > < br > < a href = "https://usn.ubuntu.com/4001-2/" > https://usn.ubuntu.com/4001-2/< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2019/03/15/1" > https://www.openwall.com/lists/oss-security/2019/03/15/1< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36084" > https://access.redhat.com/security/cve/CVE-2021-36084< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3" > https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36084.html" > https://linux.oracle.com/cve/CVE-2021-36084.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36085" > https://access.redhat.com/security/cve/CVE-2021-36085< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba" > https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36085.html" > https://linux.oracle.com/cve/CVE-2021-36085.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36086" > https://access.redhat.com/security/cve/CVE-2021-36086< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8" > https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36086.html" > https://linux.oracle.com/cve/CVE-2021-36086.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36087" > https://access.redhat.com/security/cve/CVE-2021-36087< / a > < br > < a href = "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675" > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-4513.html" > https://errata.almalinux.org/8/ALSA-2021-4513.html< / a > < br > < a href = "https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521" > https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521< / a > < br > < a href = "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml" > https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36087.html" > https://linux.oracle.com/cve/CVE-2021-36087.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4513.html" > https://linux.oracle.com/errata/ELSA-2021-4513.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/< / a > < br > < a href = "https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/" > https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5391-1" > https://ubuntu.com/security/notices/USN-5391-1< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19603" > https://access.redhat.com/security/cve/CVE-2019-19603< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603< / a > < br > < a href = "https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13" > https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-19603.html" > https://linux.oracle.com/cve/CVE-2019-19603.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4396.html" > https://linux.oracle.com/errata/ELSA-2021-4396.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20191223-0001/" > https://security.netapp.com/advisory/ntap-20191223-0001/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4394-1" > https://ubuntu.com/security/notices/USN-4394-1< / a > < br > < a href = "https://usn.ubuntu.com/4394-1/" > https://usn.ubuntu.com/4394-1/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < a href = "https://www.sqlite.org/" > https://www.sqlite.org/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19645" > https://access.redhat.com/security/cve/CVE-2019-19645< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645< / a > < br > < a href = "https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06" > https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20191223-0001/" > https://security.netapp.com/advisory/ntap-20191223-0001/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4394-1" > https://ubuntu.com/security/notices/USN-4394-1< / a > < br > < a href = "https://usn.ubuntu.com/4394-1/" > https://usn.ubuntu.com/4394-1/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < a href = "https://www.tenable.com/security/tns-2021-14" > https://www.tenable.com/security/tns-2021-14< / a > < br > < / details > |
| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19924" > https://access.redhat.com/security/cve/CVE-2019-19924< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924< / a > < br > < a href = "https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3" > https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-19924.html" > https://linux.oracle.com/cve/CVE-2019-19924.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1810.html" > https://linux.oracle.com/errata/ELSA-2020-1810.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200114-0003/" > https://security.netapp.com/advisory/ntap-20200114-0003/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4298-1" > https://ubuntu.com/security/notices/USN-4298-1< / a > < br > < a href = "https://usn.ubuntu.com/4298-1/" > https://usn.ubuntu.com/4298-1/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "http://seclists.org/fulldisclosure/2020/Nov/19" > http://seclists.org/fulldisclosure/2020/Nov/19< / a > < br > < a href = "http://seclists.org/fulldisclosure/2020/Nov/20" > http://seclists.org/fulldisclosure/2020/Nov/20< / a > < br > < a href = "http://seclists.org/fulldisclosure/2020/Nov/22" > http://seclists.org/fulldisclosure/2020/Nov/22< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13631" > https://access.redhat.com/security/cve/CVE-2020-13631< / a > < br > < a href = "https://bugs.chromium.org/p/chromium/issues/detail?id=1080459" > https://bugs.chromium.org/p/chromium/issues/detail?id=1080459< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13631.html" > https://linux.oracle.com/cve/CVE-2020-13631.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4442.html" > https://linux.oracle.com/errata/ELSA-2020-4442.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/< / a > < br > < a href = "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" > https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc< / a > < br > < a href = "https://security.gentoo.org/glsa/202007-26" > https://security.gentoo.org/glsa/202007-26< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200608-0002/" > https://security.netapp.com/advisory/ntap-20200608-0002/< / a > < br > < a href = "https://sqlite.org/src/info/eca0ba2cf4c0fdf7" > https://sqlite.org/src/info/eca0ba2cf4c0fdf7< / a > < br > < a href = "https://support.apple.com/kb/HT211843" > https://support.apple.com/kb/HT211843< / a > < br > < a href = "https://support.apple.com/kb/HT211844" > https://support.apple.com/kb/HT211844< / a > < br > < a href = "https://support.apple.com/kb/HT211850" > https://support.apple.com/kb/HT211850< / a > < br > < a href = "https://support.apple.com/kb/HT211931" > https://support.apple.com/kb/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211935" > https://support.apple.com/kb/HT211935< / a > < br > < a href = "https://support.apple.com/kb/HT211952" > https://support.apple.com/kb/HT211952< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4394-1" > https://ubuntu.com/security/notices/USN-4394-1< / a > < br > < a href = "https://usn.ubuntu.com/4394-1/" > https://usn.ubuntu.com/4394-1/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < / details > |
| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-45346" > https://access.redhat.com/security/cve/CVE-2021-45346< / a > < br > < a href = "https://github.com/guyinatuxedo/sqlite3_record_leaking" > https://github.com/guyinatuxedo/sqlite3_record_leaking< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220303-0001/" > https://security.netapp.com/advisory/ntap-20220303-0001/< / a > < br > < a href = "https://sqlite.org/forum/forumpost/53de8864ba114bf6" > https://sqlite.org/forum/forumpost/53de8864ba114bf6< / a > < br > < / details > |
| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19244" > https://access.redhat.com/security/cve/CVE-2019-19244< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244< / a > < br > < a href = "https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348" > https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4205-1" > https://ubuntu.com/security/notices/USN-4205-1< / a > < br > < a href = "https://usn.ubuntu.com/4205-1/" > https://usn.ubuntu.com/4205-1/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2020.html" > https://www.oracle.com/security-alerts/cpuapr2020.html< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-11656" > https://access.redhat.com/security/cve/CVE-2020-11656< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" > https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc< / a > < br > < a href = "https://security.gentoo.org/glsa/202007-26" > https://security.gentoo.org/glsa/202007-26< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200416-0001/" > https://security.netapp.com/advisory/ntap-20200416-0001/< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujul2020.html" > https://www.oracle.com/security-alerts/cpujul2020.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < a href = "https://www.sqlite.org/src/info/d09f8c3621d5f7f8" > https://www.sqlite.org/src/info/d09f8c3621d5f7f8< / a > < br > < a href = "https://www.tenable.com/security/tns-2021-14" > https://www.tenable.com/security/tns-2021-14< / a > < br > < a href = "https://www3.sqlite.org/cgi/src/info/b64674919f673602" > https://www3.sqlite.org/cgi/src/info/b64674919f673602< / a > < br > < / details > |
2022-05-10 21:17:41 +00:00
| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36690" > https://nvd.nist.gov/vuln/detail/CVE-2021-36690< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5403-1" > https://ubuntu.com/security/notices/USN-5403-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.sqlite.org/forum/forumpost/718c0a8d17" > https://www.sqlite.org/forum/forumpost/718c0a8d17< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libss2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-12886" > https://access.redhat.com/security/cve/CVE-2018-12886< / a > < br > < a href = "https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup" > https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379& view=markup< / a > < br > < a href = "https://www.gnu.org/software/gcc/gcc-8/changes.html" > https://www.gnu.org/software/gcc/gcc-8/changes.html< / a > < br > < / details > |
| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" > http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-15847" > https://access.redhat.com/security/cve/CVE-2019-15847< / a > < br > < a href = "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481" > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-15847.html" > https://linux.oracle.com/cve/CVE-2019-15847.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1864.html" > https://linux.oracle.com/errata/ELSA-2020-1864.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-15847" > https://nvd.nist.gov/vuln/detail/CVE-2019-15847< / a > < br > < / details > |
| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/108116" > http://www.securityfocus.com/bid/108116< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-3843" > https://access.redhat.com/security/cve/CVE-2019-3843< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843< / a > < br > < a href = "https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)" > https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-3843.html" > https://linux.oracle.com/cve/CVE-2019-3843.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1794.html" > https://linux.oracle.com/errata/ELSA-2020-1794.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-3843" > https://nvd.nist.gov/vuln/detail/CVE-2019-3843< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190619-0002/" > https://security.netapp.com/advisory/ntap-20190619-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4269-1" > https://ubuntu.com/security/notices/USN-4269-1< / a > < br > < a href = "https://usn.ubuntu.com/4269-1/" > https://usn.ubuntu.com/4269-1/< / a > < br > < / details > |
| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/108096" > http://www.securityfocus.com/bid/108096< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-3844" > https://access.redhat.com/security/cve/CVE-2019-3844< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-3844.html" > https://linux.oracle.com/cve/CVE-2019-3844.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1794.html" > https://linux.oracle.com/errata/ELSA-2020-1794.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-3844" > https://nvd.nist.gov/vuln/detail/CVE-2019-3844< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190619-0002/" > https://security.netapp.com/advisory/ntap-20190619-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4269-1" > https://ubuntu.com/security/notices/USN-4269-1< / a > < br > < a href = "https://usn.ubuntu.com/4269-1/" > https://usn.ubuntu.com/4269-1/< / a > < br > < / details > |
| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3997" > https://access.redhat.com/security/cve/CVE-2021-3997< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5226-1" > https://ubuntu.com/security/notices/USN-5226-1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/10/2" > https://www.openwall.com/lists/oss-security/2022/01/10/2< / a > < br > < / details > |
| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357" > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/10/01/9" > http://www.openwall.com/lists/oss-security/2013/10/01/9< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-4392" > https://access.redhat.com/security/cve/CVE-2013-4392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=859060" > https://bugzilla.redhat.com/show_bug.cgi?id=859060< / a > < br > < / details > |
| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html" > http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20386" > https://access.redhat.com/security/cve/CVE-2019-20386< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386< / a > < br > < a href = "https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad" > https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20386.html" > https://linux.oracle.com/cve/CVE-2019-20386.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4553.html" > https://linux.oracle.com/errata/ELSA-2020-4553.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20386" > https://nvd.nist.gov/vuln/detail/CVE-2019-20386< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200210-0002/" > https://security.netapp.com/advisory/ntap-20200210-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4269-1" > https://ubuntu.com/security/notices/USN-4269-1< / a > < br > < a href = "https://usn.ubuntu.com/4269-1/" > https://usn.ubuntu.com/4269-1/< / a > < br > < / details > |
| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/04/2" > http://www.openwall.com/lists/oss-security/2021/08/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/08/17/3" > http://www.openwall.com/lists/oss-security/2021/08/17/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/09/07/3" > http://www.openwall.com/lists/oss-security/2021/09/07/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13529" > https://access.redhat.com/security/cve/CVE-2020-13529< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13529.html" > https://linux.oracle.com/cve/CVE-2020-13529.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4361.html" > https://linux.oracle.com/errata/ELSA-2021-4361.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-48" > https://security.gentoo.org/glsa/202107-48< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210625-0005/" > https://security.netapp.com/advisory/ntap-20210625-0005/< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-1" > https://ubuntu.com/security/notices/USN-5013-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-2" > https://ubuntu.com/security/notices/USN-5013-2< / a > < br > < / details > |
| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-13776" > https://access.redhat.com/security/cve/CVE-2020-13776< / a > < br > < a href = "https://github.com/systemd/systemd/issues/15985" > https://github.com/systemd/systemd/issues/15985< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13776.html" > https://linux.oracle.com/cve/CVE-2020-13776.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1611.html" > https://linux.oracle.com/errata/ELSA-2021-1611.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-13776" > https://nvd.nist.gov/vuln/detail/CVE-2020-13776< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200611-0003/" > https://security.netapp.com/advisory/ntap-20200611-0003/< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" > http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html< / a > < br > < a href = "http://www.securityfocus.com/bid/105151" > http://www.securityfocus.com/bid/105151< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-1000654" > https://access.redhat.com/security/cve/CVE-2018-1000654< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654< / a > < br > < a href = "https://gitlab.com/gnutls/libtasn1/issues/4" > https://gitlab.com/gnutls/libtasn1/issues/4< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5352-1" > https://ubuntu.com/security/notices/USN-5352-1< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < / details > |
| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/108116" > http://www.securityfocus.com/bid/108116< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-3843" > https://access.redhat.com/security/cve/CVE-2019-3843< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843< / a > < br > < a href = "https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)" > https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-3843.html" > https://linux.oracle.com/cve/CVE-2019-3843.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1794.html" > https://linux.oracle.com/errata/ELSA-2020-1794.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-3843" > https://nvd.nist.gov/vuln/detail/CVE-2019-3843< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190619-0002/" > https://security.netapp.com/advisory/ntap-20190619-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4269-1" > https://ubuntu.com/security/notices/USN-4269-1< / a > < br > < a href = "https://usn.ubuntu.com/4269-1/" > https://usn.ubuntu.com/4269-1/< / a > < br > < / details > |
| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/108096" > http://www.securityfocus.com/bid/108096< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-3844" > https://access.redhat.com/security/cve/CVE-2019-3844< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-3844.html" > https://linux.oracle.com/cve/CVE-2019-3844.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-1794.html" > https://linux.oracle.com/errata/ELSA-2020-1794.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-3844" > https://nvd.nist.gov/vuln/detail/CVE-2019-3844< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190619-0002/" > https://security.netapp.com/advisory/ntap-20190619-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4269-1" > https://ubuntu.com/security/notices/USN-4269-1< / a > < br > < a href = "https://usn.ubuntu.com/4269-1/" > https://usn.ubuntu.com/4269-1/< / a > < br > < / details > |
| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3997" > https://access.redhat.com/security/cve/CVE-2021-3997< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5226-1" > https://ubuntu.com/security/notices/USN-5226-1< / a > < br > < a href = "https://www.openwall.com/lists/oss-security/2022/01/10/2" > https://www.openwall.com/lists/oss-security/2022/01/10/2< / a > < br > < / details > |
| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357" > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2013/10/01/9" > http://www.openwall.com/lists/oss-security/2013/10/01/9< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2013-4392" > https://access.redhat.com/security/cve/CVE-2013-4392< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=859060" > https://bugzilla.redhat.com/show_bug.cgi?id=859060< / a > < br > < / details > |
| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html" > http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20386" > https://access.redhat.com/security/cve/CVE-2019-20386< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386< / a > < br > < a href = "https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad" > https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20386.html" > https://linux.oracle.com/cve/CVE-2019-20386.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4553.html" > https://linux.oracle.com/errata/ELSA-2020-4553.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20386" > https://nvd.nist.gov/vuln/detail/CVE-2019-20386< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200210-0002/" > https://security.netapp.com/advisory/ntap-20200210-0002/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4269-1" > https://ubuntu.com/security/notices/USN-4269-1< / a > < br > < a href = "https://usn.ubuntu.com/4269-1/" > https://usn.ubuntu.com/4269-1/< / a > < br > < / details > |
| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2021/08/04/2" > http://www.openwall.com/lists/oss-security/2021/08/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/08/17/3" > http://www.openwall.com/lists/oss-security/2021/08/17/3< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2021/09/07/3" > http://www.openwall.com/lists/oss-security/2021/09/07/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-13529" > https://access.redhat.com/security/cve/CVE-2020-13529< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13529.html" > https://linux.oracle.com/cve/CVE-2020-13529.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4361.html" > https://linux.oracle.com/errata/ELSA-2021-4361.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/< / a > < br > < a href = "https://security.gentoo.org/glsa/202107-48" > https://security.gentoo.org/glsa/202107-48< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210625-0005/" > https://security.netapp.com/advisory/ntap-20210625-0005/< / a > < br > < a href = "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142" > https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-1" > https://ubuntu.com/security/notices/USN-5013-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5013-2" > https://ubuntu.com/security/notices/USN-5013-2< / a > < br > < / details > |
| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-13776" > https://access.redhat.com/security/cve/CVE-2020-13776< / a > < br > < a href = "https://github.com/systemd/systemd/issues/15985" > https://github.com/systemd/systemd/issues/15985< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-13776.html" > https://linux.oracle.com/cve/CVE-2020-13776.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1611.html" > https://linux.oracle.com/errata/ELSA-2021-1611.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-13776" > https://nvd.nist.gov/vuln/detail/CVE-2020-13776< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200611-0003/" > https://security.netapp.com/advisory/ntap-20200611-0003/< / a > < br > < / details > |
| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "http://secunia.com/advisories/27215" > http://secunia.com/advisories/27215< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482129/100/100/threaded" > http://www.securityfocus.com/archive/1/482129/100/100/threaded< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482857/100/0/threaded" > http://www.securityfocus.com/archive/1/482857/100/0/threaded< / a > < br > < a href = "http://www.securityfocus.com/bid/26048" > http://www.securityfocus.com/bid/26048< / a > < br > < a href = "http://www.vupen.com/english/advisories/2007/3474" > http://www.vupen.com/english/advisories/2007/3474< / a > < br > < a href = "https://issues.rpath.com/browse/RPL-1825" > https://issues.rpath.com/browse/RPL-1825< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-7169" > https://access.redhat.com/security/cve/CVE-2018-7169< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" > https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/97" > https://github.com/shadow-maint/shadow/pull/97< / a > < br > < a href = "https://security.gentoo.org/glsa/201805-09" > https://security.gentoo.org/glsa/201805-09< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5254-1" > https://ubuntu.com/security/notices/USN-5254-1< / a > < br > < / details > |
| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19882" > https://access.redhat.com/security/cve/CVE-2019-19882< / a > < br > < a href = "https://bugs.archlinux.org/task/64836" > https://bugs.archlinux.org/task/64836< / a > < br > < a href = "https://bugs.gentoo.org/702252" > https://bugs.gentoo.org/702252< / a > < br > < a href = "https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75" > https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/199" > https://github.com/shadow-maint/shadow/pull/199< / a > < br > < a href = "https://github.com/void-linux/void-packages/pull/17580" > https://github.com/void-linux/void-packages/pull/17580< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-09" > https://security.gentoo.org/glsa/202008-09< / a > < br > < / details > |
| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| ncurses-bin | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| ncurses-bin | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "http://secunia.com/advisories/27215" > http://secunia.com/advisories/27215< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482129/100/100/threaded" > http://www.securityfocus.com/archive/1/482129/100/100/threaded< / a > < br > < a href = "http://www.securityfocus.com/archive/1/482857/100/0/threaded" > http://www.securityfocus.com/archive/1/482857/100/0/threaded< / a > < br > < a href = "http://www.securityfocus.com/bid/26048" > http://www.securityfocus.com/bid/26048< / a > < br > < a href = "http://www.vupen.com/english/advisories/2007/3474" > http://www.vupen.com/english/advisories/2007/3474< / a > < br > < a href = "https://issues.rpath.com/browse/RPL-1825" > https://issues.rpath.com/browse/RPL-1825< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-7169" > https://access.redhat.com/security/cve/CVE-2018-7169< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" > https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/97" > https://github.com/shadow-maint/shadow/pull/97< / a > < br > < a href = "https://security.gentoo.org/glsa/201805-09" > https://security.gentoo.org/glsa/201805-09< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5254-1" > https://ubuntu.com/security/notices/USN-5254-1< / a > < br > < / details > |
| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-19882" > https://access.redhat.com/security/cve/CVE-2019-19882< / a > < br > < a href = "https://bugs.archlinux.org/task/64836" > https://bugs.archlinux.org/task/64836< / a > < br > < a href = "https://bugs.gentoo.org/702252" > https://bugs.gentoo.org/702252< / a > < br > < a href = "https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75" > https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75< / a > < br > < a href = "https://github.com/shadow-maint/shadow/pull/199" > https://github.com/shadow-maint/shadow/pull/199< / a > < br > < a href = "https://github.com/void-linux/void-packages/pull/17580" > https://github.com/void-linux/void-packages/pull/17580< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-09" > https://security.gentoo.org/glsa/202008-09< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2011/11/04/2" > http://www.openwall.com/lists/oss-security/2011/11/04/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2011/11/04/4" > http://www.openwall.com/lists/oss-security/2011/11/04/4< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2011-4116" > https://access.redhat.com/security/cve/CVE-2011-4116< / a > < br > < a href = "https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14" > https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14< / a > < br > < a href = "https://rt.cpan.org/Public/Bug/Display.html?id=69106" > https://rt.cpan.org/Public/Bug/Display.html?id=69106< / a > < br > < a href = "https://seclists.org/oss-sec/2011/q4/238" > https://seclists.org/oss-sec/2011/q4/238< / a > < br > < / details > |
| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | < details > < summary > Expand...< / summary > < a href = "http://marc.info/?l=bugtraq&m=112327628230258&w=2" > http://marc.info/?l=bugtraq& m=112327628230258& w=2< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2005-2541" > https://access.redhat.com/security/cve/CVE-2005-2541< / a > < br > < a href = "https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E" > https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E< / a > < br > < / details > |
| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | < details > < summary > Expand...< / summary > < a href = "http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120" > http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html" > http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html< / a > < br > < a href = "http://savannah.gnu.org/bugs/?55369" > http://savannah.gnu.org/bugs/?55369< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-9923" > https://access.redhat.com/security/cve/CVE-2019-9923< / a > < br > < a href = "https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241" > https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923< / a > < br > < a href = "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" > https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4692-1" > https://ubuntu.com/security/notices/USN-4692-1< / a > < br > < / details > |
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-20193" > https://access.redhat.com/security/cve/CVE-2021-20193< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1917565" > https://bugzilla.redhat.com/show_bug.cgi?id=1917565< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193< / a > < br > < a href = "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777" > https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777< / a > < br > < a href = "https://savannah.gnu.org/bugs/?59897" > https://savannah.gnu.org/bugs/?59897< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-29" > https://security.gentoo.org/glsa/202105-29< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5329-1" > https://ubuntu.com/security/notices/USN-5329-1< / a > < br > < / details > |
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37600" > https://access.redhat.com/security/cve/CVE-2021-37600< / a > < br > < a href = "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" > https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c< / a > < br > < a href = "https://github.com/karelzak/util-linux/issues/1395" > https://github.com/karelzak/util-linux/issues/1395< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37600" > https://nvd.nist.gov/vuln/detail/CVE-2021-37600< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210902-0002/" > https://security.netapp.com/advisory/ntap-20210902-0002/< / a > < br > < / details > |
2022-04-03 16:31:59 +00:00
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0563" > https://access.redhat.com/security/cve/CVE-2022-0563< / a > < br > < a href = "https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u" > https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0563" > https://nvd.nist.gov/vuln/detail/CVE-2022-0563< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220331-0002/" > https://security.netapp.com/advisory/ntap-20220331-0002/< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
**node-pkg**
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-05-17 08:50:16 +00:00
| ajv | CVE-2020-15366 | MEDIUM | 6.12.2 | 6.12.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-15366" > https://access.redhat.com/security/cve/CVE-2020-15366< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0551.html" > https://errata.almalinux.org/8/ALSA-2021-0551.html< / a > < br > < a href = "https://github.com/advisories/GHSA-v88g-cgmw-v5xw" > https://github.com/advisories/GHSA-v88g-cgmw-v5xw< / a > < br > < a href = "https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f" > https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f< / a > < br > < a href = "https://github.com/ajv-validator/ajv/releases/tag/v6.12.3" > https://github.com/ajv-validator/ajv/releases/tag/v6.12.3< / a > < br > < a href = "https://github.com/ajv-validator/ajv/tags" > https://github.com/ajv-validator/ajv/tags< / a > < br > < a href = "https://hackerone.com/bugs?subject=user&report_id=894259" > https://hackerone.com/bugs?subject=user& report_id=894259< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-15366.html" > https://linux.oracle.com/cve/CVE-2020-15366.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0551.html" > https://linux.oracle.com/errata/ELSA-2021-0551.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" > https://nvd.nist.gov/vuln/detail/CVE-2020-15366< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-AJV-584908" > https://snyk.io/vuln/SNYK-JS-AJV-584908< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| async | CVE-2021-43138 | HIGH | 1.0.0 | 2.6.4, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-fwr7-v2mv-hh25" > https://github.com/advisories/GHSA-fwr7-v2mv-hh25< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/internal/iterator.js" > https://github.com/caolan/async/blob/master/lib/internal/iterator.js< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js" > https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js< / a > < br > < a href = "https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264" > https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264< / a > < br > < a href = "https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2" > https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2< / a > < br > < a href = "https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d" > https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d< / a > < br > < a href = "https://github.com/caolan/async/compare/v2.6.3...v2.6.4" > https://github.com/caolan/async/compare/v2.6.3...v2.6.4< / a > < br > < a href = "https://github.com/caolan/async/pull/1828" > https://github.com/caolan/async/pull/1828< / a > < br > < a href = "https://jsfiddle.net/oz5twjd9/" > https://jsfiddle.net/oz5twjd9/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43138" > https://nvd.nist.gov/vuln/detail/CVE-2021-43138< / a > < br > < / details > |
| async | CVE-2021-43138 | HIGH | 2.6.3 | 2.6.4, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-fwr7-v2mv-hh25" > https://github.com/advisories/GHSA-fwr7-v2mv-hh25< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/internal/iterator.js" > https://github.com/caolan/async/blob/master/lib/internal/iterator.js< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js" > https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js< / a > < br > < a href = "https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264" > https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264< / a > < br > < a href = "https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2" > https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2< / a > < br > < a href = "https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d" > https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d< / a > < br > < a href = "https://github.com/caolan/async/compare/v2.6.3...v2.6.4" > https://github.com/caolan/async/compare/v2.6.3...v2.6.4< / a > < br > < a href = "https://github.com/caolan/async/pull/1828" > https://github.com/caolan/async/pull/1828< / a > < br > < a href = "https://jsfiddle.net/oz5twjd9/" > https://jsfiddle.net/oz5twjd9/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43138" > https://nvd.nist.gov/vuln/detail/CVE-2021-43138< / a > < br > < / details > |
| async | CVE-2021-43138 | HIGH | 3.2.0 | 2.6.4, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-fwr7-v2mv-hh25" > https://github.com/advisories/GHSA-fwr7-v2mv-hh25< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/internal/iterator.js" > https://github.com/caolan/async/blob/master/lib/internal/iterator.js< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js" > https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js< / a > < br > < a href = "https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264" > https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264< / a > < br > < a href = "https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2" > https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2< / a > < br > < a href = "https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d" > https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d< / a > < br > < a href = "https://github.com/caolan/async/compare/v2.6.3...v2.6.4" > https://github.com/caolan/async/compare/v2.6.3...v2.6.4< / a > < br > < a href = "https://github.com/caolan/async/pull/1828" > https://github.com/caolan/async/pull/1828< / a > < br > < a href = "https://jsfiddle.net/oz5twjd9/" > https://jsfiddle.net/oz5twjd9/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43138" > https://nvd.nist.gov/vuln/detail/CVE-2021-43138< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| axios | CVE-2019-10742 | HIGH | 0.18.0 | 0.18.1 | < details > < summary > Expand...< / summary > < a href = "https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505" > https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505< / a > < br > < a href = "https://github.com/advisories/GHSA-42xw-2xvc-qx8m" > https://github.com/advisories/GHSA-42xw-2xvc-qx8m< / a > < br > < a href = "https://github.com/axios/axios/issues/1098" > https://github.com/axios/axios/issues/1098< / a > < br > < a href = "https://github.com/axios/axios/pull/1485" > https://github.com/axios/axios/pull/1485< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-10742" > https://nvd.nist.gov/vuln/detail/CVE-2019-10742< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-AXIOS-174505" > https://snyk.io/vuln/SNYK-JS-AXIOS-174505< / a > < br > < a href = "https://www.npmjs.com/advisories/880" > https://www.npmjs.com/advisories/880< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| axios | CVE-2020-28168 | HIGH | 0.18.0 | 0.21.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28168" > https://access.redhat.com/security/cve/CVE-2020-28168< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28168" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28168< / a > < br > < a href = "https://github.com/advisories/GHSA-4w2v-q235-vp99" > https://github.com/advisories/GHSA-4w2v-q235-vp99< / a > < br > < a href = "https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55" > https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55< / a > < br > < a href = "https://github.com/axios/axios/issues/3369" > https://github.com/axios/axios/issues/3369< / a > < br > < a href = "https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28168" > https://nvd.nist.gov/vuln/detail/CVE-2020-28168< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-AXIOS-1038255" > https://snyk.io/vuln/SNYK-JS-AXIOS-1038255< / a > < br > < a href = "https://www.npmjs.com/advisories/1594" > https://www.npmjs.com/advisories/1594< / a > < br > < a href = "https://www.npmjs.com/package/axios" > https://www.npmjs.com/package/axios< / a > < br > < / details > |
| axios | CVE-2021-3749 | HIGH | 0.18.0 | 0.21.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3749" > https://access.redhat.com/security/cve/CVE-2021-3749< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3749" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3749< / a > < br > < a href = "https://github.com/advisories/GHSA-cph5-m8f7-6c5x" > https://github.com/advisories/GHSA-cph5-m8f7-6c5x< / a > < br > < a href = "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" > https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929< / a > < br > < a href = "https://github.com/axios/axios/pull/3980" > https://github.com/axios/axios/pull/3980< / a > < br > < a href = "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" > https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31< / a > < br > < a href = "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/" > https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/< / a > < br > < a href = "https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E" > https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" > https://nvd.nist.gov/vuln/detail/CVE-2021-3749< / a > < br > < a href = "https://www.npmjs.com/package/axios" > https://www.npmjs.com/package/axios< / a > < br > < / details > |
| bootstrap | CVE-2016-10735 | MEDIUM | 3.3.5 | 3.4.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHBA-2019:1076" > https://access.redhat.com/errata/RHBA-2019:1076< / a > < br > < a href = "https://access.redhat.com/errata/RHBA-2019:1570" > https://access.redhat.com/errata/RHBA-2019:1570< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:1456" > https://access.redhat.com/errata/RHSA-2019:1456< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3023" > https://access.redhat.com/errata/RHSA-2019:3023< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0132" > https://access.redhat.com/errata/RHSA-2020:0132< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0133" > https://access.redhat.com/errata/RHSA-2020:0133< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-10735" > https://access.redhat.com/security/cve/CVE-2016-10735< / a > < br > < a href = "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/" > https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735< / a > < br > < a href = "https://github.com/advisories/GHSA-4p24-vmcr-4gqj" > https://github.com/advisories/GHSA-4p24-vmcr-4gqj< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/20184" > https://github.com/twbs/bootstrap/issues/20184< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906" > https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/23679" > https://github.com/twbs/bootstrap/pull/23679< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/23687" > https://github.com/twbs/bootstrap/pull/23687< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/26460" > https://github.com/twbs/bootstrap/pull/26460< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2016-10735.html" > https://linux.oracle.com/cve/CVE-2016-10735.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4847.html" > https://linux.oracle.com/errata/ELSA-2020-4847.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10735" > https://nvd.nist.gov/vuln/detail/CVE-2016-10735< / a > < br > < / details > |
| bootstrap | CVE-2018-14041 | MEDIUM | 3.3.5 | 4.1.2, 3.4.0 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html" > http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html< / a > < br > < a href = "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html" > http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/10" > http://seclists.org/fulldisclosure/2019/May/10< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/11" > http://seclists.org/fulldisclosure/2019/May/11< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/13" > http://seclists.org/fulldisclosure/2019/May/13< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:1456" > https://access.redhat.com/errata/RHSA-2019:1456< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-14041" > https://access.redhat.com/security/cve/CVE-2018-14041< / a > < br > < a href = "https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/" > https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/< / a > < br > < a href = "https://github.com/advisories/GHSA-pj7m-g53m-7638" > https://github.com/advisories/GHSA-pj7m-g53m-7638< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/26423" > https://github.com/twbs/bootstrap/issues/26423< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/26627" > https://github.com/twbs/bootstrap/issues/26627< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/26630" > https://github.com/twbs/bootstrap/pull/26630< / a > < br > < a href = "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E" > https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" > https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E" > https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-14041" > https://nvd.nist.gov/vuln/detail/CVE-2018-14041< / a > < br > < a href = "https://seclists.org/bugtraq/2019/May/18" > https://seclists.org/bugtraq/2019/May/18< / a > < br > < a href = "https://typo3.org/security/advisory/typo3-core-sa-2019-006" > https://typo3.org/security/advisory/typo3-core-sa-2019-006< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < / details > |
| bootstrap | CVE-2018-20676 | MEDIUM | 3.3.5 | 3.4.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHBA-2019:1076" > https://access.redhat.com/errata/RHBA-2019:1076< / a > < br > < a href = "https://access.redhat.com/errata/RHBA-2019:1570" > https://access.redhat.com/errata/RHBA-2019:1570< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:1456" > https://access.redhat.com/errata/RHSA-2019:1456< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3023" > https://access.redhat.com/errata/RHSA-2019:3023< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0132" > https://access.redhat.com/errata/RHSA-2020:0132< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0133" > https://access.redhat.com/errata/RHSA-2020:0133< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20676" > https://access.redhat.com/security/cve/CVE-2018-20676< / a > < br > < a href = "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/" > https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676< / a > < br > < a href = "https://github.com/advisories/GHSA-3mgp-fx93-9xv5" > https://github.com/advisories/GHSA-3mgp-fx93-9xv5< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27044" > https://github.com/twbs/bootstrap/issues/27044< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906" > https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628" > https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/27047" > https://github.com/twbs/bootstrap/pull/27047< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-20676.html" > https://linux.oracle.com/cve/CVE-2018-20676.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4670.html" > https://linux.oracle.com/errata/ELSA-2020-4670.html< / a > < br > < a href = "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" > https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20676" > https://nvd.nist.gov/vuln/detail/CVE-2018-20676< / a > < br > < / details > |
| bootstrap | CVE-2018-20677 | MEDIUM | 3.3.5 | 3.4.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHBA-2019:1076" > https://access.redhat.com/errata/RHBA-2019:1076< / a > < br > < a href = "https://access.redhat.com/errata/RHBA-2019:1570" > https://access.redhat.com/errata/RHBA-2019:1570< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:1456" > https://access.redhat.com/errata/RHSA-2019:1456< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3023" > https://access.redhat.com/errata/RHSA-2019:3023< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0132" > https://access.redhat.com/errata/RHSA-2020:0132< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0133" > https://access.redhat.com/errata/RHSA-2020:0133< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-20677" > https://access.redhat.com/security/cve/CVE-2018-20677< / a > < br > < a href = "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/" > https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677< / a > < br > < a href = "https://github.com/advisories/GHSA-ph58-4vrj-w6hr" > https://github.com/advisories/GHSA-ph58-4vrj-w6hr< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27045" > https://github.com/twbs/bootstrap/issues/27045< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906" > https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906< / a > < br > < a href = "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628" > https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/27047" > https://github.com/twbs/bootstrap/pull/27047< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2018-20677.html" > https://linux.oracle.com/cve/CVE-2018-20677.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4670.html" > https://linux.oracle.com/errata/ELSA-2020-4670.html< / a > < br > < a href = "https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E" > https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" > https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-20677" > https://nvd.nist.gov/vuln/detail/CVE-2018-20677< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| bootstrap | CVE-2019-8331 | MEDIUM | 3.3.5 | 3.4.1, 4.3.1 | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html" > http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/10" > http://seclists.org/fulldisclosure/2019/May/10< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/11" > http://seclists.org/fulldisclosure/2019/May/11< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/13" > http://seclists.org/fulldisclosure/2019/May/13< / a > < br > < a href = "http://www.securityfocus.com/bid/107375" > http://www.securityfocus.com/bid/107375< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:1456" > https://access.redhat.com/errata/RHSA-2019:1456< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3023" > https://access.redhat.com/errata/RHSA-2019:3023< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3024" > https://access.redhat.com/errata/RHSA-2019:3024< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-8331" > https://access.redhat.com/security/cve/CVE-2019-8331< / a > < br > < a href = "https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/" > https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331< / a > < br > < a href = "https://github.com/advisories/GHSA-9v3m-8fp8-mj99" > https://github.com/advisories/GHSA-9v3m-8fp8-mj99< / a > < br > < a href = "https://github.com/twbs/bootstrap-sass/releases/tag/v3.4.1" > https://github.com/twbs/bootstrap-sass/releases/tag/v3.4.1< / a > < br > < a href = "https://github.com/twbs/bootstrap/pull/28236" > https://github.com/twbs/bootstrap/pull/28236< / a > < br > < a href = "https://github.com/twbs/bootstrap/releases/tag/v3.4.1" > https://github.com/twbs/bootstrap/releases/tag/v3.4.1< / a > < br > < a href = "https://github.com/twbs/bootstrap/releases/tag/v4.3.1" > https://github.com/twbs/bootstrap/releases/tag/v4.3.1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-8331.html" > https://linux.oracle.com/cve/CVE-2019-8331.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4847.html" > https://linux.oracle.com/errata/ELSA-2020-4847.html< / a > < br > < a href = "https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E" > https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E" > https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E" > https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E" > https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E" > https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9
2022-03-30 20:23:21 +00:00
| cached-path-relative | CVE-2021-23518 | HIGH | 1.0.2 | 1.1.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23518" > https://access.redhat.com/security/cve/CVE-2021-23518< / a > < br > < a href = "https://github.com/advisories/GHSA-wg6g-ppvx-927h" > https://github.com/advisories/GHSA-wg6g-ppvx-927h< / a > < br > < a href = "https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760" > https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23518" > https://nvd.nist.gov/vuln/detail/CVE-2021-23518< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2348246" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2348246< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653" > https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653< / a > < br > < / details > |
| csv-parse | CVE-2019-17592 | HIGH | 3.2.0 | 4.4.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-17592" > https://access.redhat.com/security/cve/CVE-2019-17592< / a > < br > < a href = "https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a" > https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a< / a > < br > < a href = "https://github.com/advisories/GHSA-582f-p4pg-xc74" > https://github.com/advisories/GHSA-582f-p4pg-xc74< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-17592" > https://nvd.nist.gov/vuln/detail/CVE-2019-17592< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20191127-0002/" > https://security.netapp.com/advisory/ntap-20191127-0002/< / a > < br > < a href = "https://www.npmjs.com/advisories/1171" > https://www.npmjs.com/advisories/1171< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| ejs | CVE-2022-29078 | HIGH | 2.7.4 | 3.1.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29078" > https://access.redhat.com/security/cve/CVE-2022-29078< / a > < br > < a href = "https://eslam.io/posts/ejs-server-side-template-injection-rce/" > https://eslam.io/posts/ejs-server-side-template-injection-rce/< / a > < br > < a href = "https://github.com/advisories/GHSA-phwq-j96m-2c2q" > https://github.com/advisories/GHSA-phwq-j96m-2c2q< / a > < br > < a href = "https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf" > https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf< / a > < br > < a href = "https://github.com/mde/ejs/releases" > https://github.com/mde/ejs/releases< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29078" > https://nvd.nist.gov/vuln/detail/CVE-2022-29078< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| electron | CVE-2019-5786 | CRITICAL | 3.0.7 | ^2.0.18, ^3.0.16, ^3.1.6, ^4.0.8, ^5.0.0-beta.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-5786" > https://access.redhat.com/security/cve/CVE-2019-5786< / a > < br > < a href = "https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation/" > https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation/< / a > < br > < a href = "https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html" > https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html< / a > < br > < a href = "https://crbug.com/936448" > https://crbug.com/936448< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5786" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5786< / a > < br > < a href = "https://electronjs.org/blog/filereader-fix" > https://electronjs.org/blog/filereader-fix< / a > < br > < a href = "https://github.com/GoogleChrome/puppeteer/issues/4141" > https://github.com/GoogleChrome/puppeteer/issues/4141< / a > < br > < a href = "https://github.com/advisories/GHSA-c2gp-86p4-5935" > https://github.com/advisories/GHSA-c2gp-86p4-5935< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-5786" > https://nvd.nist.gov/vuln/detail/CVE-2019-5786< / a > < br > < a href = "https://security.googleblog.com/2019/03/disclosing-vulnerabilities-to-protect.html" > https://security.googleblog.com/2019/03/disclosing-vulnerabilities-to-protect.html< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-PUPPETEER-174321" > https://snyk.io/vuln/SNYK-JS-PUPPETEER-174321< / a > < br > < a href = "https://www.cisecurity.org/advisory/a-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2019-026/" > https://www.cisecurity.org/advisory/a-vulnerability-in-google-chrome-could-allow-for-arbitrary-code-execution_2019-026/< / a > < br > < a href = "https://www.npmjs.com/advisories/824" > https://www.npmjs.com/advisories/824< / a > < br > < / details > |
| electron | CVE-2020-4076 | HIGH | 3.0.7 | 7.2.4, 8.2.4 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-m93v-9qjc-3g79" > https://github.com/advisories/GHSA-m93v-9qjc-3g79< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79" > https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-4076" > https://nvd.nist.gov/vuln/detail/CVE-2020-4076< / a > < br > < a href = "https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824" > https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824< / a > < br > < / details > |
| electron | CVE-2020-4077 | HIGH | 3.0.7 | 7.2.4, 8.2.4 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-h9jc-284h-533g" > https://github.com/advisories/GHSA-h9jc-284h-533g< / a > < br > < a href = "https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0" > https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g" > https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-4077" > https://nvd.nist.gov/vuln/detail/CVE-2020-4077< / a > < br > < a href = "https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824" > https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| electron | CVE-2020-26272 | MEDIUM | 3.0.7 | 11.1.0, 10.2.0, 9.4.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-hvf8-h2qh-37m9" > https://github.com/advisories/GHSA-hvf8-h2qh-37m9< / a > < br > < a href = "https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c" > https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c< / a > < br > < a href = "https://github.com/electron/electron/pull/26875" > https://github.com/electron/electron/pull/26875< / a > < br > < a href = "https://github.com/electron/electron/releases/tag/v9.4.0" > https://github.com/electron/electron/releases/tag/v9.4.0< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9" > https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-26272" > https://nvd.nist.gov/vuln/detail/CVE-2020-26272< / a > < br > < a href = "https://www.electronjs.org/releases/stable?version=9#9.4.0" > https://www.electronjs.org/releases/stable?version=9#9.4.0< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| electron | CVE-2020-4075 | MEDIUM | 3.0.7 | 7.2.4, 8.2.4 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-f9mq-jph6-9mhm" > https://github.com/advisories/GHSA-f9mq-jph6-9mhm< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm" > https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-4075" > https://nvd.nist.gov/vuln/detail/CVE-2020-4075< / a > < br > < a href = "https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824" > https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824< / a > < br > < / details > |
| electron | CVE-2021-39184 | MEDIUM | 3.0.7 | 13.3.0, 12.1.0, 11.5.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-mpjm-v997-c4h4" > https://github.com/advisories/GHSA-mpjm-v997-c4h4< / a > < br > < a href = "https://github.com/electron/electron/pull/30728" > https://github.com/electron/electron/pull/30728< / a > < br > < a href = "https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f" > https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4" > https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39184" > https://nvd.nist.gov/vuln/detail/CVE-2021-39184< / a > < br > < / details > |
| electron | CVE-2020-15096 | LOW | 3.0.7 | 8.2.4, 7.2.4, 6.1.11 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-6vrv-94jv-crrg" > https://github.com/advisories/GHSA-6vrv-94jv-crrg< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg" > https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-15096" > https://nvd.nist.gov/vuln/detail/CVE-2020-15096< / a > < br > < a href = "https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824" > https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824< / a > < br > < / details > |
2022-03-26 15:30:42 +00:00
| electron | CVE-2022-21718 | LOW | 3.0.7 | 17.0.0-alpha.6, 16.0.6, 15.3.5, 14.2.4, 13.6.6 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-3p22-ghq8-v749" > https://github.com/advisories/GHSA-3p22-ghq8-v749< / a > < br > < a href = "https://github.com/electron/electron/pull/32178" > https://github.com/electron/electron/pull/32178< / a > < br > < a href = "https://github.com/electron/electron/pull/32240" > https://github.com/electron/electron/pull/32240< / a > < br > < a href = "https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749" > https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21718" > https://nvd.nist.gov/vuln/detail/CVE-2022-21718< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| elliptic | CVE-2020-13822 | HIGH | 6.5.2 | 6.5.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-13822" > https://access.redhat.com/security/cve/CVE-2020-13822< / a > < br > < a href = "https://github.com/advisories/GHSA-vh7m-p724-62c2" > https://github.com/advisories/GHSA-vh7m-p724-62c2< / a > < br > < a href = "https://github.com/indutny/elliptic/issues/226" > https://github.com/indutny/elliptic/issues/226< / a > < br > < a href = "https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4" > https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-13822" > https://nvd.nist.gov/vuln/detail/CVE-2020-13822< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ELLIPTIC-571484" > https://snyk.io/vuln/SNYK-JS-ELLIPTIC-571484< / a > < br > < a href = "https://www.npmjs.com/package/elliptic" > https://www.npmjs.com/package/elliptic< / a > < br > < a href = "https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/" > https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| elliptic | CVE-2020-28498 | MEDIUM | 6.5.2 | 6.5.4 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-r9p9-mrjm-926w" > https://github.com/advisories/GHSA-r9p9-mrjm-926w< / a > < br > < a href = "https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md" > https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md< / a > < br > < a href = "https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f" > https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f< / a > < br > < a href = "https://github.com/indutny/elliptic/pull/244/commits" > https://github.com/indutny/elliptic/pull/244/commits< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28498" > https://nvd.nist.gov/vuln/detail/CVE-2020-28498< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899" > https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899< / a > < br > < a href = "https://www.npmjs.com/package/elliptic" > https://www.npmjs.com/package/elliptic< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| follow-redirects | CVE-2022-0155 | HIGH | 1.13.3 | 1.14.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0155" > https://access.redhat.com/security/cve/CVE-2022-0155< / a > < br > < a href = "https://github.com/advisories/GHSA-74fj-2j2h-c42q" > https://github.com/advisories/GHSA-74fj-2j2h-c42q< / a > < br > < a href = "https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22" > https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22< / a > < br > < a href = "https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406" > https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0155" > https://nvd.nist.gov/vuln/detail/CVE-2022-0155< / a > < br > < / details > |
| follow-redirects | CVE-2022-0536 | MEDIUM | 1.13.3 | 1.14.8 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0536" > https://access.redhat.com/security/cve/CVE-2022-0536< / a > < br > < a href = "https://github.com/advisories/GHSA-pw2r-vq6v-hr8c" > https://github.com/advisories/GHSA-pw2r-vq6v-hr8c< / a > < br > < a href = "https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445" > https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445< / a > < br > < a href = "https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db" > https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" > https://nvd.nist.gov/vuln/detail/CVE-2022-0536< / a > < br > < / details > |
| glob-parent | CVE-2020-28469 | HIGH | 3.1.0 | 5.1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28469" > https://access.redhat.com/security/cve/CVE-2020-28469< / a > < br > < a href = "https://github.com/advisories/GHSA-ww39-953v-wcq6" > https://github.com/advisories/GHSA-ww39-953v-wcq6< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9" > https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/pull/36" > https://github.com/gulpjs/glob-parent/pull/36< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2" > https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-28469.html" > https://linux.oracle.com/cve/CVE-2020-28469.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" > https://nvd.nist.gov/vuln/detail/CVE-2020-28469< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" > https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| glob-parent | CVE-2020-28469 | HIGH | 5.1.1 | 5.1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28469" > https://access.redhat.com/security/cve/CVE-2020-28469< / a > < br > < a href = "https://github.com/advisories/GHSA-ww39-953v-wcq6" > https://github.com/advisories/GHSA-ww39-953v-wcq6< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9" > https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/pull/36" > https://github.com/gulpjs/glob-parent/pull/36< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2" > https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-28469.html" > https://linux.oracle.com/cve/CVE-2020-28469.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" > https://nvd.nist.gov/vuln/detail/CVE-2020-28469< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" > https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| highlight.js | GHSA-7wwv-vh3v-89cq | MEDIUM | 9.13.1 | 10.4.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-7wwv-vh3v-89cq" > https://github.com/advisories/GHSA-7wwv-vh3v-89cq< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c" > https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq" > https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq< / a > < br > < a href = "https://www.npmjs.com/package/@highlightjs/cdn-assets" > https://www.npmjs.com/package/@highlightjs/cdn-assets< / a > < br > < a href = "https://www.npmjs.com/package/highlight.js" > https://www.npmjs.com/package/highlight.js< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| highlight.js | CVE-2020-26237 | LOW | 9.13.1 | 10.1.2, 9.18.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-26237" > https://access.redhat.com/security/cve/CVE-2020-26237< / a > < br > < a href = "https://github.com/advisories/GHSA-vfrc-7r7c-w9mx" > https://github.com/advisories/GHSA-vfrc-7r7c-w9mx< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0" > https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/pull/2636" > https://github.com/highlightjs/highlight.js/pull/2636< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx" > https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html" > https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-26237" > https://nvd.nist.gov/vuln/detail/CVE-2020-26237< / a > < br > < a href = "https://www.npmjs.com/package/highlight.js" > https://www.npmjs.com/package/highlight.js< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| hosted-git-info | CVE-2021-23362 | MEDIUM | 2.8.8 | 2.8.9, 3.0.8 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23362" > https://access.redhat.com/security/cve/CVE-2021-23362< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3074.html" > https://errata.almalinux.org/8/ALSA-2021-3074.html< / a > < br > < a href = "https://github.com/advisories/GHSA-43f8-2h32-f4cj" > https://github.com/advisories/GHSA-43f8-2h32-f4cj< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7" > https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01" > https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3" > https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commits/v2" > https://github.com/npm/hosted-git-info/commits/v2< / a > < br > < a href = "https://github.com/npm/hosted-git-info/pull/76" > https://github.com/npm/hosted-git-info/pull/76< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-23362.html" > https://linux.oracle.com/cve/CVE-2021-23362.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3074.html" > https://linux.oracle.com/errata/ELSA-2021-3074.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" > https://nvd.nist.gov/vuln/detail/CVE-2021-23362< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355" > https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| ini | CVE-2020-7788 | HIGH | 1.3.5 | 1.3.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7788" > https://access.redhat.com/security/cve/CVE-2020-7788< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788< / a > < br > < a href = "https://github.com/advisories/GHSA-qqgx-2p2h-9c37" > https://github.com/advisories/GHSA-qqgx-2p2h-9c37< / a > < br > < a href = "https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1" > https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1< / a > < br > < a href = "https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)" > https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7788.html" > https://linux.oracle.com/cve/CVE-2020-7788.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html" > https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" > https://nvd.nist.gov/vuln/detail/CVE-2020-7788< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-INI-1048974" > https://snyk.io/vuln/SNYK-JS-INI-1048974< / a > < br > < a href = "https://www.npmjs.com/advisories/1589" > https://www.npmjs.com/advisories/1589< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| jquery | NSWG-ECO-328 | HIGH | 2.2.1 | > =3.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614)" > https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614)< / a > < br > < a href = "https://github.com/jquery/jquery/issues/2432)" > https://github.com/jquery/jquery/issues/2432)< / a > < br > < a href = "https://github.com/jquery/jquery/pull/2588)" > https://github.com/jquery/jquery/pull/2588)< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| jquery | CVE-2015-9251 | MEDIUM | 2.2.1 | 3.0.0 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" > http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html< / a > < br > < a href = "http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html" > http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html< / a > < br > < a href = "http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html" > http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html< / a > < br > < a href = "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html" > http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/10" > http://seclists.org/fulldisclosure/2019/May/10< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/11" > http://seclists.org/fulldisclosure/2019/May/11< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/13" > http://seclists.org/fulldisclosure/2019/May/13< / a > < br > < a href = "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" > http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html< / a > < br > < a href = "http://www.securityfocus.com/bid/105658" > http://www.securityfocus.com/bid/105658< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0481" > https://access.redhat.com/errata/RHSA-2020:0481< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2020:0729" > https://access.redhat.com/errata/RHSA-2020:0729< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2015-9251" > https://access.redhat.com/security/cve/CVE-2015-9251< / a > < br > < a href = "https://github.com/advisories/GHSA-rmxg-73gg-4p98" > https://github.com/advisories/GHSA-rmxg-73gg-4p98< / a > < br > < a href = "https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614" > https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614< / a > < br > < a href = "https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc" > https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc< / a > < br > < a href = "https://github.com/jquery/jquery/issues/2432" > https://github.com/jquery/jquery/issues/2432< / a > < br > < a href = "https://github.com/jquery/jquery/pull/2588" > https://github.com/jquery/jquery/pull/2588< / a > < br > < a href = "https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2" > https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2< / a > < br > < a href = "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04" > https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04< / a > < br > < a href = "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601" > https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2015-9251.html" > https://linux.oracle.com/cve/CVE-2015-9251.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4847.html" > https://linux.oracle.com/errata/ELSA-2020-4847.html< / a > < br > < a href = "https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E" > https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E" > https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" > https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E" >
| jquery | CVE-2019-11358 | MEDIUM | 2.2.1 | > =3.4.0 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" > http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html< / a > < br > < a href = "http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html" > http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html< / a > < br > < a href = "http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html" > http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html< / a > < br > < a href = "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html" > http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/10" > http://seclists.org/fulldisclosure/2019/May/10< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/11" > http://seclists.org/fulldisclosure/2019/May/11< / a > < br > < a href = "http://seclists.org/fulldisclosure/2019/May/13" > http://seclists.org/fulldisclosure/2019/May/13< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2019/06/03/2" > http://www.openwall.com/lists/oss-security/2019/06/03/2< / a > < br > < a href = "http://www.securityfocus.com/bid/108023" > http://www.securityfocus.com/bid/108023< / a > < br > < a href = "https://access.redhat.com/errata/RHBA-2019:1570" > https://access.redhat.com/errata/RHBA-2019:1570< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:1456" > https://access.redhat.com/errata/RHSA-2019:1456< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:2587" > https://access.redhat.com/errata/RHSA-2019:2587< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3023" > https://access.redhat.com/errata/RHSA-2019:3023< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2019:3024" > https://access.redhat.com/errata/RHSA-2019:3024< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-11358" > https://access.redhat.com/security/cve/CVE-2019-11358< / a > < br > < a href = "https://backdropcms.org/security/backdrop-sa-core-2019-009" > https://backdropcms.org/security/backdrop-sa-core-2019-009< / a > < br > < a href = "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" > https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358< / a > < br > < a href = "https://github.com/DanielRuf/snyk-js-jquery-174006?files=1" > https://github.com/DanielRuf/snyk-js-jquery-174006?files=1< / a > < br > < a href = "https://github.com/advisories/GHSA-6c3j-c64m-qhgq" > https://github.com/advisories/GHSA-6c3j-c64m-qhgq< / a > < br > < a href = "https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b" > https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b< / a > < br > < a href = "https://github.com/jquery/jquery/pull/4333" > https://github.com/jquery/jquery/pull/4333< / a > < br > < a href = "https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#434" > https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#434< / a > < br > < a href = "https://hackerone.com/reports/454365" > https://hackerone.com/reports/454365< / a > < br > < a href = "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601" > https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-11358.html" > https://linux.oracle.com/cve/CVE-2019-11358.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-4847.html" > https://linux.oracle.com/errata/ELSA-2020-4847.html< / a > < br > < a href = "https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E" > https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E
2022-04-20 21:21:59 +00:00
| jquery | CVE-2020-11022 | MEDIUM | 2.2.1 | 3.5.0 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html< / a > < br > < a href = "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html" > http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-11022" > https://access.redhat.com/security/cve/CVE-2020-11022< / a > < br > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/< / a > < br > < a href = "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" > https://github.com/advisories/GHSA-gxr4-xjj5-5px2< / a > < br > < a href = "https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77" > https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77< / a > < br > < a href = "https://github.com/jquery/jquery/releases/tag/3.5.0" > https://github.com/jquery/jquery/releases/tag/3.5.0< / a > < br > < a href = "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2" > https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2< / a > < br > < a href = "https://jquery.com/upgrade-guide/3.5/" > https://jquery.com/upgrade-guide/3.5/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-11022.html" > https://linux.oracle.com/cve/CVE-2020-11022.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9177.html" > https://linux.oracle.com/errata/ELSA-2022-9177.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E" > https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E" > https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E< / a > < br > < a hr
| jquery | CVE-2020-11023 | MEDIUM | 2.2.1 | 3.5.0 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html< / a > < br > < a href = "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html" > http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-11023" > https://access.redhat.com/security/cve/CVE-2020-11023< / a > < br > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released< / a > < br > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023< / a > < br > < a href = "https://github.com/advisories/GHSA-jpcq-cgw6-v4j6" > https://github.com/advisories/GHSA-jpcq-cgw6-v4j6< / a > < br > < a href = "https://github.com/jquery/jquery/releases/tag/3.5.0" > https://github.com/jquery/jquery/releases/tag/3.5.0< / a > < br > < a href = "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6" > https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6< / a > < br > < a href = "https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440" > https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440< / a > < br > < a href = "https://jquery.com/upgrade-guide/3.5/" > https://jquery.com/upgrade-guide/3.5/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-11023.html" > https://linux.oracle.com/cve/CVE-2020-11023.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9177.html" > https://linux.oracle.com/errata/ELSA-2022-9177.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E" > https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E" > https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E" > https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E" > https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4
2022-02-27 23:06:38 +00:00
| js-yaml | GHSA-8j8c-7jfh-h6hx | HIGH | 3.12.0 | 3.13.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-8j8c-7jfh-h6hx" > https://github.com/advisories/GHSA-8j8c-7jfh-h6hx< / a > < br > < a href = "https://github.com/nodeca/js-yaml/pull/480" > https://github.com/nodeca/js-yaml/pull/480< / a > < br > < a href = "https://www.npmjs.com/advisories/813" > https://www.npmjs.com/advisories/813< / a > < br > < / details > |
| js-yaml | GHSA-2pr6-76vf-7546 | MEDIUM | 3.12.0 | 3.13.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-2pr6-76vf-7546" > https://github.com/advisories/GHSA-2pr6-76vf-7546< / a > < br > < a href = "https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235" > https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235< / a > < br > < a href = "https://github.com/nodeca/js-yaml/issues/475" > https://github.com/nodeca/js-yaml/issues/475< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-JSYAML-173999" > https://snyk.io/vuln/SNYK-JS-JSYAML-173999< / a > < br > < a href = "https://www.npmjs.com/advisories/788" > https://www.npmjs.com/advisories/788< / a > < br > < a href = "https://www.npmjs.com/advisories/788/versions" > https://www.npmjs.com/advisories/788/versions< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| json-schema | CVE-2021-3918 | MEDIUM | 0.2.3 | 0.4.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3918" > https://access.redhat.com/security/cve/CVE-2021-3918< / a > < br > < a href = "https://github.com/advisories/GHSA-896r-f27r-55mw" > https://github.com/advisories/GHSA-896r-f27r-55mw< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741" > https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a" > https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa" > https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa< / a > < br > < a href = "https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9" > https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3918.html" > https://linux.oracle.com/cve/CVE-2021-3918.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3918" > https://nvd.nist.gov/vuln/detail/CVE-2021-3918< / a > < br > < / details > |
| jszip | CVE-2021-23413 | MEDIUM | 3.6.0 | 3.7.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23413" > https://access.redhat.com/security/cve/CVE-2021-23413< / a > < br > < a href = "https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88" > https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88< / a > < br > < a href = "https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36" > https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36< / a > < br > < a href = "https://github.com/Stuk/jszip/pull/766" > https://github.com/Stuk/jszip/pull/766< / a > < br > < a href = "https://github.com/advisories/GHSA-jg8v-48h5-wgxg" > https://github.com/advisories/GHSA-jg8v-48h5-wgxg< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23413" > https://nvd.nist.gov/vuln/detail/CVE-2021-23413< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1251499< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-JSZIP-1251497" > https://snyk.io/vuln/SNYK-JS-JSZIP-1251497< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| lodash | CVE-2020-8203 | HIGH | 4.17.15 | 4.17.20 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-8203" > https://access.redhat.com/security/cve/CVE-2020-8203< / a > < br > < a href = "https://github.com/advisories/GHSA-p6mc-m468-83gw" > https://github.com/advisories/GHSA-p6mc-m468-83gw< / a > < br > < a href = "https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12" > https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12< / a > < br > < a href = "https://github.com/lodash/lodash/issues/4744" > https://github.com/lodash/lodash/issues/4744< / a > < br > < a href = "https://github.com/lodash/lodash/issues/4874" > https://github.com/lodash/lodash/issues/4874< / a > < br > < a href = "https://hackerone.com/reports/712065" > https://hackerone.com/reports/712065< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-8203" > https://nvd.nist.gov/vuln/detail/CVE-2020-8203< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200724-0006/" > https://security.netapp.com/advisory/ntap-20200724-0006/< / a > < br > < a href = "https://www.npmjs.com/advisories/1523" > https://www.npmjs.com/advisories/1523< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| lodash | CVE-2021-23337 | HIGH | 4.17.15 | 4.17.21 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23337" > https://access.redhat.com/security/cve/CVE-2021-23337< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337< / a > < br > < a href = "https://github.com/advisories/GHSA-35jh-r3h4-6jhm" > https://github.com/advisories/GHSA-35jh-r3h4-6jhm< / a > < br > < a href = "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851" > https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851< / a > < br > < a href = "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851" > https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851< / a > < br > < a href = "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c" > https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23337" > https://nvd.nist.gov/vuln/detail/CVE-2021-23337< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210312-0006/" > https://security.netapp.com/advisory/ntap-20210312-0006/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932" > https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-1040724" > https://snyk.io/vuln/SNYK-JS-LODASH-1040724< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| lodash | NSWG-ECO-516 | HIGH | 4.17.15 | > =4.17.19 | < details > < summary > Expand...< / summary > < a href = "https://github.com/lodash/lodash/pull/4759" > https://github.com/lodash/lodash/pull/4759< / a > < br > < a href = "https://hackerone.com/reports/712065" > https://hackerone.com/reports/712065< / a > < br > < a href = "https://www.npmjs.com/advisories/1523" > https://www.npmjs.com/advisories/1523< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| lodash | CVE-2020-28500 | MEDIUM | 4.17.15 | 4.17.21 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28500" > https://access.redhat.com/security/cve/CVE-2020-28500< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500< / a > < br > < a href = "https://github.com/advisories/GHSA-29mw-wpgm-hmr9" > https://github.com/advisories/GHSA-29mw-wpgm-hmr9< / a > < br > < a href = "https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8" > https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8< / a > < br > < a href = "https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8" > https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8< / a > < br > < a href = "https://github.com/lodash/lodash/pull/5065" > https://github.com/lodash/lodash/pull/5065< / a > < br > < a href = "https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7" > https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28500" > https://nvd.nist.gov/vuln/detail/CVE-2020-28500< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210312-0006/" > https://security.netapp.com/advisory/ntap-20210312-0006/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896" > https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-1018905" > https://snyk.io/vuln/SNYK-JS-LODASH-1018905< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| minimatch | CVE-2016-10540 | HIGH | 0.3.0 | 3.0.2 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10540" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10540< / a > < br > < a href = "https://github.com/advisories/GHSA-hxm2-r34f-qmc5" > https://github.com/advisories/GHSA-hxm2-r34f-qmc5< / a > < br > < a href = "https://nodesecurity.io/advisories/118" > https://nodesecurity.io/advisories/118< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10540" > https://nvd.nist.gov/vuln/detail/CVE-2016-10540< / a > < br > < a href = "https://www.npmjs.com/advisories/118" > https://www.npmjs.com/advisories/118< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| minimatch | NSWG-ECO-118 | HIGH | 0.3.0 | > =3.0.2 | < details > < summary > Expand...< / summary > < a href = "https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS" > https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| minimist | CVE-2021-44906 | CRITICAL | 0.0.8 | 1.2.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44906" > https://access.redhat.com/security/cve/CVE-2021-44906< / a > < br > < a href = "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" > https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip< / a > < br > < a href = "https://github.com/advisories/GHSA-xvch-5gv4-984h" > https://github.com/advisories/GHSA-xvch-5gv4-984h< / a > < br > < a href = "https://github.com/substack/minimist/blob/master/index.js#L69" > https://github.com/substack/minimist/blob/master/index.js#L69< / a > < br > < a href = "https://github.com/substack/minimist/issues/164" > https://github.com/substack/minimist/issues/164< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" > https://nvd.nist.gov/vuln/detail/CVE-2021-44906< / a > < br > < a href = "https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" > https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| minimist | CVE-2020-7598 | MEDIUM | 0.0.8 | 1.2.3, 0.2.1 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" > http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-7598" > https://access.redhat.com/security/cve/CVE-2020-7598< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2020-2852.html" > https://errata.almalinux.org/8/ALSA-2020-2852.html< / a > < br > < a href = "https://github.com/advisories/GHSA-vh95-rmgr-6w4m" > https://github.com/advisories/GHSA-vh95-rmgr-6w4m< / a > < br > < a href = "https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab" > https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab< / a > < br > < a href = "https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95" > https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95< / a > < br > < a href = "https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94" > https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7598.html" > https://linux.oracle.com/cve/CVE-2020-7598.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-2852.html" > https://linux.oracle.com/errata/ELSA-2020-2852.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" > https://nvd.nist.gov/vuln/detail/CVE-2020-7598< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://www.npmjs.com/advisories/1179" > https://www.npmjs.com/advisories/1179< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| minimist | CVE-2021-44906 | CRITICAL | 1.1.3 | 1.2.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44906" > https://access.redhat.com/security/cve/CVE-2021-44906< / a > < br > < a href = "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" > https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip< / a > < br > < a href = "https://github.com/advisories/GHSA-xvch-5gv4-984h" > https://github.com/advisories/GHSA-xvch-5gv4-984h< / a > < br > < a href = "https://github.com/substack/minimist/blob/master/index.js#L69" > https://github.com/substack/minimist/blob/master/index.js#L69< / a > < br > < a href = "https://github.com/substack/minimist/issues/164" > https://github.com/substack/minimist/issues/164< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" > https://nvd.nist.gov/vuln/detail/CVE-2021-44906< / a > < br > < a href = "https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" > https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| minimist | CVE-2020-7598 | MEDIUM | 1.1.3 | 1.2.3, 0.2.1 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" > http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-7598" > https://access.redhat.com/security/cve/CVE-2020-7598< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2020-2852.html" > https://errata.almalinux.org/8/ALSA-2020-2852.html< / a > < br > < a href = "https://github.com/advisories/GHSA-vh95-rmgr-6w4m" > https://github.com/advisories/GHSA-vh95-rmgr-6w4m< / a > < br > < a href = "https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab" > https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab< / a > < br > < a href = "https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95" > https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95< / a > < br > < a href = "https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94" > https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7598.html" > https://linux.oracle.com/cve/CVE-2020-7598.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-2852.html" > https://linux.oracle.com/errata/ELSA-2020-2852.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" > https://nvd.nist.gov/vuln/detail/CVE-2020-7598< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://www.npmjs.com/advisories/1179" > https://www.npmjs.com/advisories/1179< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| minimist | CVE-2021-44906 | CRITICAL | 1.2.5 | 1.2.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44906" > https://access.redhat.com/security/cve/CVE-2021-44906< / a > < br > < a href = "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" > https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip< / a > < br > < a href = "https://github.com/advisories/GHSA-xvch-5gv4-984h" > https://github.com/advisories/GHSA-xvch-5gv4-984h< / a > < br > < a href = "https://github.com/substack/minimist/blob/master/index.js#L69" > https://github.com/substack/minimist/blob/master/index.js#L69< / a > < br > < a href = "https://github.com/substack/minimist/issues/164" > https://github.com/substack/minimist/issues/164< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" > https://nvd.nist.gov/vuln/detail/CVE-2021-44906< / a > < br > < a href = "https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" > https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| moment | CVE-2022-24785 | HIGH | 2.22.2 | 2.29.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24785" > https://access.redhat.com/security/cve/CVE-2022-24785< / a > < br > < a href = "https://github.com/advisories/GHSA-8hfj-j24r-96c4" > https://github.com/advisories/GHSA-8hfj-j24r-96c4< / a > < br > < a href = "https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5" > https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5< / a > < br > < a href = "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" > https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" > https://nvd.nist.gov/vuln/detail/CVE-2022-24785< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220513-0006/" > https://security.netapp.com/advisory/ntap-20220513-0006/< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-09" > https://www.tenable.com/security/tns-2022-09< / a > < br > < / details > |
| moment | CVE-2022-24785 | HIGH | 2.29.1 | 2.29.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24785" > https://access.redhat.com/security/cve/CVE-2022-24785< / a > < br > < a href = "https://github.com/advisories/GHSA-8hfj-j24r-96c4" > https://github.com/advisories/GHSA-8hfj-j24r-96c4< / a > < br > < a href = "https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5" > https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5< / a > < br > < a href = "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" > https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" > https://nvd.nist.gov/vuln/detail/CVE-2022-24785< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220513-0006/" > https://security.netapp.com/advisory/ntap-20220513-0006/< / a > < br > < a href = "https://www.tenable.com/security/tns-2022-09" > https://www.tenable.com/security/tns-2022-09< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| node-fetch | CVE-2022-0235 | HIGH | 2.2.0 | 2.6.7, 3.1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0235" > https://access.redhat.com/security/cve/CVE-2022-0235< / a > < br > < a href = "https://github.com/advisories/GHSA-r683-j2x4-v87g" > https://github.com/advisories/GHSA-r683-j2x4-v87g< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10" > https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60" > https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/pull/1453" > https://github.com/node-fetch/node-fetch/pull/1453< / a > < br > < a href = "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7" > https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7< / a > < br > < a href = "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" > https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" > https://nvd.nist.gov/vuln/detail/CVE-2022-0235< / a > < br > < / details > |
| node-fetch | CVE-2020-15168 | LOW | 2.2.0 | 3.0.0-beta.9, 2.6.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-15168" > https://access.redhat.com/security/cve/CVE-2020-15168< / a > < br > < a href = "https://github.com/advisories/GHSA-w7rc-rwvf-8q5r" > https://github.com/advisories/GHSA-w7rc-rwvf-8q5r< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r" > https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-15168" > https://nvd.nist.gov/vuln/detail/CVE-2020-15168< / a > < br > < a href = "https://www.npmjs.com/package/node-fetch" > https://www.npmjs.com/package/node-fetch< / a > < br > < / details > |
| node-fetch | CVE-2022-0235 | HIGH | 2.6.1 | 2.6.7, 3.1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0235" > https://access.redhat.com/security/cve/CVE-2022-0235< / a > < br > < a href = "https://github.com/advisories/GHSA-r683-j2x4-v87g" > https://github.com/advisories/GHSA-r683-j2x4-v87g< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10" > https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60" > https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/pull/1453" > https://github.com/node-fetch/node-fetch/pull/1453< / a > < br > < a href = "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7" > https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7< / a > < br > < a href = "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" > https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" > https://nvd.nist.gov/vuln/detail/CVE-2022-0235< / a > < br > < / details > |
| node-forge | CVE-2022-24771 | HIGH | 0.10.0 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24771" > https://access.redhat.com/security/cve/CVE-2022-24771< / a > < br > < a href = "https://github.com/advisories/GHSA-cfm4-qjh2-4765" > https://github.com/advisories/GHSA-cfm4-qjh2-4765< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" > https://nvd.nist.gov/vuln/detail/CVE-2022-24771< / a > < br > < / details > |
| node-forge | CVE-2022-24772 | HIGH | 0.10.0 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24772" > https://access.redhat.com/security/cve/CVE-2022-24772< / a > < br > < a href = "https://github.com/advisories/GHSA-x4jg-mjrx-434g" > https://github.com/advisories/GHSA-x4jg-mjrx-434g< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" > https://nvd.nist.gov/vuln/detail/CVE-2022-24772< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| node-forge | CVE-2022-0122 | MEDIUM | 0.10.0 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-8fr3-hfg3-gpgp" > https://github.com/advisories/GHSA-8fr3-hfg3-gpgp< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e" > https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e< / a > < br > < a href = "https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae" > https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0122" > https://nvd.nist.gov/vuln/detail/CVE-2022-0122< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| node-forge | CVE-2022-24773 | MEDIUM | 0.10.0 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24773" > https://access.redhat.com/security/cve/CVE-2022-24773< / a > < br > < a href = "https://github.com/advisories/GHSA-2r2c-g63r-vccr" > https://github.com/advisories/GHSA-2r2c-g63r-vccr< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24773" > https://nvd.nist.gov/vuln/detail/CVE-2022-24773< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| node-forge | GHSA-5rrq-pxf6-6jx5 | LOW | 0.10.0 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-5rrq-pxf6-6jx5" > https://github.com/advisories/GHSA-5rrq-pxf6-6jx5< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5< / a > < br > < / details > |
| node-forge | GHSA-gf8q-jrpm-jvxq | LOW | 0.10.0 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-gf8q-jrpm-jvxq" > https://github.com/advisories/GHSA-gf8q-jrpm-jvxq< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| node-forge | CVE-2020-7720 | HIGH | 0.7.6 | 0.10.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7720" > https://access.redhat.com/security/cve/CVE-2020-7720< / a > < br > < a href = "https://github.com/advisories/GHSA-92xj-mqp7-vmcj" > https://github.com/advisories/GHSA-92xj-mqp7-vmcj< / a > < br > < a href = "https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md" > https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md< / a > < br > < a href = "https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed" > https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7720" > https://nvd.nist.gov/vuln/detail/CVE-2020-7720< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677" > https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677< / a > < br > < / details > |
| node-forge | CVE-2022-24771 | HIGH | 0.7.6 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24771" > https://access.redhat.com/security/cve/CVE-2022-24771< / a > < br > < a href = "https://github.com/advisories/GHSA-cfm4-qjh2-4765" > https://github.com/advisories/GHSA-cfm4-qjh2-4765< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" > https://nvd.nist.gov/vuln/detail/CVE-2022-24771< / a > < br > < / details > |
| node-forge | CVE-2022-24772 | HIGH | 0.7.6 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24772" > https://access.redhat.com/security/cve/CVE-2022-24772< / a > < br > < a href = "https://github.com/advisories/GHSA-x4jg-mjrx-434g" > https://github.com/advisories/GHSA-x4jg-mjrx-434g< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" > https://nvd.nist.gov/vuln/detail/CVE-2022-24772< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| node-forge | CVE-2022-0122 | MEDIUM | 0.7.6 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-8fr3-hfg3-gpgp" > https://github.com/advisories/GHSA-8fr3-hfg3-gpgp< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e" > https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e< / a > < br > < a href = "https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae" > https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0122" > https://nvd.nist.gov/vuln/detail/CVE-2022-0122< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| node-forge | CVE-2022-24773 | MEDIUM | 0.7.6 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24773" > https://access.redhat.com/security/cve/CVE-2022-24773< / a > < br > < a href = "https://github.com/advisories/GHSA-2r2c-g63r-vccr" > https://github.com/advisories/GHSA-2r2c-g63r-vccr< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24773" > https://nvd.nist.gov/vuln/detail/CVE-2022-24773< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| node-forge | GHSA-5rrq-pxf6-6jx5 | LOW | 0.7.6 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-5rrq-pxf6-6jx5" > https://github.com/advisories/GHSA-5rrq-pxf6-6jx5< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5< / a > < br > < / details > |
| node-forge | GHSA-gf8q-jrpm-jvxq | LOW | 0.7.6 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-gf8q-jrpm-jvxq" > https://github.com/advisories/GHSA-gf8q-jrpm-jvxq< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq< / a > < br > < / details > |
| node-forge | GHSA-wxgw-qj99-44c2 | LOW | 0.7.6 | 0.10.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-wxgw-qj99-44c2" > https://github.com/advisories/GHSA-wxgw-qj99-44c2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| normalize-url | CVE-2021-33502 | HIGH | 4.5.0 | 4.5.1, 6.0.1, 5.3.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-33502" > https://access.redhat.com/security/cve/CVE-2021-33502< / a > < br > < a href = "https://github.com/advisories/GHSA-px4h-xg32-q955" > https://github.com/advisories/GHSA-px4h-xg32-q955< / a > < br > < a href = "https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103" > https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103< / a > < br > < a href = "https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1" > https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-33502.html" > https://linux.oracle.com/cve/CVE-2021-33502.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33502" > https://nvd.nist.gov/vuln/detail/CVE-2021-33502< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210706-0001/" > https://security.netapp.com/advisory/ntap-20210706-0001/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539" > https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539< / a > < br > < / details > |
2022-05-22 06:12:12 +00:00
| path-parse | CVE-2021-23343 | MEDIUM | 1.0.6 | 1.0.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-23343" > https://access.redhat.com/security/cve/CVE-2021-23343< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://github.com/advisories/GHSA-hj48-42vr-x3v9" > https://github.com/advisories/GHSA-hj48-42vr-x3v9< / a > < br > < a href = "https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7" > https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7< / a > < br > < a href = "https://github.com/jbgutierrez/path-parse/issues/8" > https://github.com/jbgutierrez/path-parse/issues/8< / a > < br > < a href = "https://github.com/jbgutierrez/path-parse/pull/10" > https://github.com/jbgutierrez/path-parse/pull/10< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-23343.html" > https://linux.oracle.com/cve/CVE-2021-23343.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E" > https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" > https://nvd.nist.gov/vuln/detail/CVE-2021-23343< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" > https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| redis | CVE-2021-29469 | LOW | 2.8.0 | 3.1.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e" > https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e< / a > < br > < a href = "https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1" > https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1< / a > < br > < a href = "https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3" > https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3< / a > < br > < a href = "https://github.com/advisories/GHSA-35q2-47q7-3pc3" > https://github.com/advisories/GHSA-35q2-47q7-3pc3< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-29469" > https://nvd.nist.gov/vuln/detail/CVE-2021-29469< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210611-0010/" > https://security.netapp.com/advisory/ntap-20210611-0010/< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| saml2-js | GHSA-mfcp-34xw-p57x | MEDIUM | 2.0.3 | 2.0.5 | < details > < summary > Expand...< / summary > < a href = "https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0" > https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0< / a > < br > < a href = "https://github.com/Clever/saml2/pull/190" > https://github.com/Clever/saml2/pull/190< / a > < br > < a href = "https://github.com/advisories/GHSA-mfcp-34xw-p57x" > https://github.com/advisories/GHSA-mfcp-34xw-p57x< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-SAML2JS-474637" > https://snyk.io/vuln/SNYK-JS-SAML2JS-474637< / a > < br > < a href = "https://www.npmjs.com/advisories/1222" > https://www.npmjs.com/advisories/1222< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| shell-quote | CVE-2016-10541 | CRITICAL | 1.4.3 | 1.6.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2016-10541" > https://access.redhat.com/security/cve/CVE-2016-10541< / a > < br > < a href = "https://github.com/advisories/GHSA-qg8p-v9q4-gh34" > https://github.com/advisories/GHSA-qg8p-v9q4-gh34< / a > < br > < a href = "https://nodesecurity.io/advisories/117" > https://nodesecurity.io/advisories/117< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10541" > https://nvd.nist.gov/vuln/detail/CVE-2016-10541< / a > < br > < a href = "https://www.npmjs.com/advisories/117" > https://www.npmjs.com/advisories/117< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| shell-quote | NSWG-ECO-117 | HIGH | 1.4.3 | > =1.6.1 | < details > < summary > Expand...< / summary > < / details > |
2022-05-17 08:50:16 +00:00
| ssri | CVE-2021-27290 | HIGH | 6.0.1 | 8.0.1, 7.1.1, 6.0.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-27290" > https://access.redhat.com/security/cve/CVE-2021-27290< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290< / a > < br > < a href = "https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf" > https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3074.html" > https://errata.almalinux.org/8/ALSA-2021-3074.html< / a > < br > < a href = "https://github.com/advisories/GHSA-vx3p-948g-6vhq" > https://github.com/advisories/GHSA-vx3p-948g-6vhq< / a > < br > < a href = "https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2" > https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2< / a > < br > < a href = "https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1" > https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1< / a > < br > < a href = "https://github.com/npm/ssri/pull/20#issuecomment-842677644" > https://github.com/npm/ssri/pull/20#issuecomment-842677644< / a > < br > < a href = "https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf" > https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27290.html" > https://linux.oracle.com/cve/CVE-2021-27290.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3074.html" > https://linux.oracle.com/errata/ELSA-2021-3074.html< / a > < br > < a href = "https://npmjs.com" > https://npmjs.com< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" > https://nvd.nist.gov/vuln/detail/CVE-2021-27290< / a > < br > < a href = "https://www.npmjs.com/package/ssri" > https://www.npmjs.com/package/ssri< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-32803 | HIGH | 4.4.13 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32803" > https://access.redhat.com/security/cve/CVE-2021-32803< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://github.com/advisories/GHSA-r628-mhmh-qjhw" > https://github.com/advisories/GHSA-r628-mhmh-qjhw< / a > < br > < a href = "https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20" > https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" > https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32803.html" > https://linux.oracle.com/cve/CVE-2021-32803.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" > https://nvd.nist.gov/vuln/detail/CVE-2021-32803< / a > < br > < a href = "https://www.npmjs.com/advisories/1771" > https://www.npmjs.com/advisories/1771< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-32804 | HIGH | 4.4.13 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32804" > https://access.redhat.com/security/cve/CVE-2021-32804< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://github.com/advisories/GHSA-3jfq-g458-7qm9" > https://github.com/advisories/GHSA-3jfq-g458-7qm9< / a > < br > < a href = "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" > https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" > https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32804.html" > https://linux.oracle.com/cve/CVE-2021-32804.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" > https://nvd.nist.gov/vuln/detail/CVE-2021-32804< / a > < br > < a href = "https://www.npmjs.com/advisories/1770" > https://www.npmjs.com/advisories/1770< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| tar | CVE-2021-37701 | HIGH | 4.4.13 | 6.1.7, 5.0.8, 4.4.16 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37701" > https://access.redhat.com/security/cve/CVE-2021-37701< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-9r2w-394v-53qc" > https://github.com/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" > https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37701.html" > https://linux.oracle.com/cve/CVE-2021-37701.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" > https://nvd.nist.gov/vuln/detail/CVE-2021-37701< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1779" > https://www.npmjs.com/advisories/1779< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-37712 | HIGH | 4.4.13 | 6.1.9, 5.0.10, 4.4.18 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37712" > https://access.redhat.com/security/cve/CVE-2021-37712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-qq89-hq3f-393p" > https://github.com/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" > https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37712.html" > https://linux.oracle.com/cve/CVE-2021-37712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" > https://nvd.nist.gov/vuln/detail/CVE-2021-37712< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1780" > https://www.npmjs.com/advisories/1780< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-37713 | HIGH | 4.4.13 | 6.1.9, 5.0.10, 4.4.18 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37713" > https://access.redhat.com/security/cve/CVE-2021-37713< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-5955-9wpr-37jh" > https://github.com/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" > https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" > https://nvd.nist.gov/vuln/detail/CVE-2021-37713< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| tar | CVE-2021-32803 | HIGH | 6.0.2 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32803" > https://access.redhat.com/security/cve/CVE-2021-32803< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://github.com/advisories/GHSA-r628-mhmh-qjhw" > https://github.com/advisories/GHSA-r628-mhmh-qjhw< / a > < br > < a href = "https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20" > https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" > https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32803.html" > https://linux.oracle.com/cve/CVE-2021-32803.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" > https://nvd.nist.gov/vuln/detail/CVE-2021-32803< / a > < br > < a href = "https://www.npmjs.com/advisories/1771" > https://www.npmjs.com/advisories/1771< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-32804 | HIGH | 6.0.2 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32804" > https://access.redhat.com/security/cve/CVE-2021-32804< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://github.com/advisories/GHSA-3jfq-g458-7qm9" > https://github.com/advisories/GHSA-3jfq-g458-7qm9< / a > < br > < a href = "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" > https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" > https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32804.html" > https://linux.oracle.com/cve/CVE-2021-32804.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" > https://nvd.nist.gov/vuln/detail/CVE-2021-32804< / a > < br > < a href = "https://www.npmjs.com/advisories/1770" > https://www.npmjs.com/advisories/1770< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| tar | CVE-2021-37701 | HIGH | 6.0.2 | 6.1.7, 5.0.8, 4.4.16 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37701" > https://access.redhat.com/security/cve/CVE-2021-37701< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-9r2w-394v-53qc" > https://github.com/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" > https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37701.html" > https://linux.oracle.com/cve/CVE-2021-37701.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" > https://nvd.nist.gov/vuln/detail/CVE-2021-37701< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1779" > https://www.npmjs.com/advisories/1779< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-37712 | HIGH | 6.0.2 | 6.1.9, 5.0.10, 4.4.18 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37712" > https://access.redhat.com/security/cve/CVE-2021-37712< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-qq89-hq3f-393p" > https://github.com/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" > https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37712.html" > https://linux.oracle.com/cve/CVE-2021-37712.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" > https://nvd.nist.gov/vuln/detail/CVE-2021-37712< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5008" > https://www.debian.org/security/2021/dsa-5008< / a > < br > < a href = "https://www.npmjs.com/advisories/1780" > https://www.npmjs.com/advisories/1780< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| tar | CVE-2021-37713 | HIGH | 6.0.2 | 6.1.9, 5.0.10, 4.4.18 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-37713" > https://access.redhat.com/security/cve/CVE-2021-37713< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://github.com/advisories/GHSA-5955-9wpr-37jh" > https://github.com/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" > https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" > https://nvd.nist.gov/vuln/detail/CVE-2021-37713< / a > < br > < a href = "https://www.npmjs.com/package/tar" > https://www.npmjs.com/package/tar< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| trim-newlines | CVE-2021-33623 | HIGH | 1.0.0 | 4.0.1, 3.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-33623" > https://access.redhat.com/security/cve/CVE-2021-33623< / a > < br > < a href = "https://github.com/advisories/GHSA-7p7h-4mm5-852v" > https://github.com/advisories/GHSA-7p7h-4mm5-852v< / a > < br > < a href = "https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91" > https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91< / a > < br > < a href = "https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1" > https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-33623" > https://nvd.nist.gov/vuln/detail/CVE-2021-33623< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210702-0007/" > https://security.netapp.com/advisory/ntap-20210702-0007/< / a > < br > < a href = "https://www.npmjs.com/package/trim-newlines" > https://www.npmjs.com/package/trim-newlines< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| typeorm | CVE-2020-8158 | CRITICAL | 0.2.18 | 0.2.25 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-pf2j-9qmp-jqr2" > https://github.com/advisories/GHSA-pf2j-9qmp-jqr2< / a > < br > < a href = "https://hackerone.com/reports/869574" > https://hackerone.com/reports/869574< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-8158" > https://nvd.nist.gov/vuln/detail/CVE-2020-8158< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| ws | CVE-2021-32640 | MEDIUM | 6.1.0 | 5.2.3, 6.2.2, 7.4.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32640" > https://access.redhat.com/security/cve/CVE-2021-32640< / a > < br > < a href = "https://github.com/advisories/GHSA-6fc8-4gx4-v693" > https://github.com/advisories/GHSA-6fc8-4gx4-v693< / a > < br > < a href = "https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff" > https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff< / a > < br > < a href = "https://github.com/websockets/ws/issues/1895" > https://github.com/websockets/ws/issues/1895< / a > < br > < a href = "https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693" > https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693< / a > < br > < a href = "https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E" > https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32640" > https://nvd.nist.gov/vuln/detail/CVE-2021-32640< / a > < br > < / details > |
| ws | CVE-2021-32640 | MEDIUM | 7.4.4 | 5.2.3, 6.2.2, 7.4.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32640" > https://access.redhat.com/security/cve/CVE-2021-32640< / a > < br > < a href = "https://github.com/advisories/GHSA-6fc8-4gx4-v693" > https://github.com/advisories/GHSA-6fc8-4gx4-v693< / a > < br > < a href = "https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff" > https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff< / a > < br > < a href = "https://github.com/websockets/ws/issues/1895" > https://github.com/websockets/ws/issues/1895< / a > < br > < a href = "https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693" > https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693< / a > < br > < a href = "https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E" > https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32640" > https://nvd.nist.gov/vuln/detail/CVE-2021-32640< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
| xml-crypto | GHSA-c27r-x354-4m68 | HIGH | 0.10.1 | 2.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-c27r-x354-4m68" > https://github.com/advisories/GHSA-c27r-x354-4m68< / a > < br > < a href = "https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100" > https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100< / a > < br > < a href = "https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68" > https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68< / a > < br > < a href = "https://www.npmjs.com/package/xml-crypto" > https://www.npmjs.com/package/xml-crypto< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| xmldom | CVE-2021-32796 | MEDIUM | 0.1.19 | 0.7.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32796" > https://access.redhat.com/security/cve/CVE-2021-32796< / a > < br > < a href = "https://github.com/advisories/GHSA-5fg8-2547-mr8q" > https://github.com/advisories/GHSA-5fg8-2547-mr8q< / a > < br > < a href = "https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b" > https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b< / a > < br > < a href = "https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q" > https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q< / a > < br > < a href = "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/" > https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/< / a > < br > < a href = "https://mattermost.com/blog/securing-xml-implementations-across-the-web/" > https://mattermost.com/blog/securing-xml-implementations-across-the-web/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32796" > https://nvd.nist.gov/vuln/detail/CVE-2021-32796< / a > < br > < a href = "https://www.npmjs.com/package/@xmldom/xmldom" > https://www.npmjs.com/package/@xmldom/xmldom< / a > < br > < / details > |
| xmldom | CVE-2021-21366 | LOW | 0.1.19 | 0.5.0 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21366" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21366< / a > < br > < a href = "https://github.com/advisories/GHSA-h6q6-9hqw-rwfv" > https://github.com/advisories/GHSA-h6q6-9hqw-rwfv< / a > < br > < a href = "https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135" > https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135< / a > < br > < a href = "https://github.com/xmldom/xmldom/releases/tag/0.5.0" > https://github.com/xmldom/xmldom/releases/tag/0.5.0< / a > < br > < a href = "https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv" > https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21366" > https://nvd.nist.gov/vuln/detail/CVE-2021-21366< / a > < br > < a href = "https://www.npmjs.com/package/xmldom" > https://www.npmjs.com/package/xmldom< / a > < br > < / details > |
| xmldom | CVE-2021-32796 | MEDIUM | 0.1.31 | 0.7.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32796" > https://access.redhat.com/security/cve/CVE-2021-32796< / a > < br > < a href = "https://github.com/advisories/GHSA-5fg8-2547-mr8q" > https://github.com/advisories/GHSA-5fg8-2547-mr8q< / a > < br > < a href = "https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b" > https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b< / a > < br > < a href = "https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q" > https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q< / a > < br > < a href = "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/" > https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/< / a > < br > < a href = "https://mattermost.com/blog/securing-xml-implementations-across-the-web/" > https://mattermost.com/blog/securing-xml-implementations-across-the-web/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32796" > https://nvd.nist.gov/vuln/detail/CVE-2021-32796< / a > < br > < a href = "https://www.npmjs.com/package/@xmldom/xmldom" > https://www.npmjs.com/package/@xmldom/xmldom< / a > < br > < / details > |
| xmldom | CVE-2021-21366 | LOW | 0.1.31 | 0.5.0 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21366" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21366< / a > < br > < a href = "https://github.com/advisories/GHSA-h6q6-9hqw-rwfv" > https://github.com/advisories/GHSA-h6q6-9hqw-rwfv< / a > < br > < a href = "https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135" > https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135< / a > < br > < a href = "https://github.com/xmldom/xmldom/releases/tag/0.5.0" > https://github.com/xmldom/xmldom/releases/tag/0.5.0< / a > < br > < a href = "https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv" > https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-21366" > https://nvd.nist.gov/vuln/detail/CVE-2021-21366< / a > < br > < a href = "https://www.npmjs.com/package/xmldom" > https://www.npmjs.com/package/xmldom< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| y18n | CVE-2020-7774 | HIGH | 4.0.0 | 5.0.5, 4.0.1, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7774" > https://access.redhat.com/security/cve/CVE-2020-7774< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0551.html" > https://errata.almalinux.org/8/ALSA-2021-0551.html< / a > < br > < a href = "https://github.com/advisories/GHSA-c4w7-xm78-47vh" > https://github.com/advisories/GHSA-c4w7-xm78-47vh< / a > < br > < a href = "https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25" > https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25< / a > < br > < a href = "https://github.com/yargs/y18n/issues/96" > https://github.com/yargs/y18n/issues/96< / a > < br > < a href = "https://github.com/yargs/y18n/pull/108" > https://github.com/yargs/y18n/pull/108< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7774.html" > https://linux.oracle.com/cve/CVE-2020-7774.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0551.html" > https://linux.oracle.com/errata/ELSA-2021-0551.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" > https://nvd.nist.gov/vuln/detail/CVE-2020-7774< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" > https://snyk.io/vuln/SNYK-JS-Y18N-1021887< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < / details > |
| yargs-parser | CVE-2020-7608 | MEDIUM | 11.1.1 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7608" > https://access.redhat.com/security/cve/CVE-2020-7608< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0548.html" > https://errata.almalinux.org/8/ALSA-2021-0548.html< / a > < br > < a href = "https://github.com/advisories/GHSA-p9pc-299p-vxgp" > https://github.com/advisories/GHSA-p9pc-299p-vxgp< / a > < br > < a href = "https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2" > https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7608.html" > https://linux.oracle.com/cve/CVE-2020-7608.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0548.html" > https://linux.oracle.com/errata/ELSA-2021-0548.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7608" > https://nvd.nist.gov/vuln/detail/CVE-2020-7608< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381" > https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381< / a > < br > < a href = "https://www.npmjs.com/advisories/1500" > https://www.npmjs.com/advisories/1500< / a > < br > < / details > |
2022-02-27 23:06:38 +00:00
**python-pkg**
2022-02-28 11:31:46 +00:00
2022-02-27 23:06:38 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
2022-05-17 08:50:16 +00:00
| lxml | CVE-2021-43818 | HIGH | 4.6.3 | 4.6.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43818" > https://access.redhat.com/security/cve/CVE-2021-43818< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2022-1932.html" > https://errata.almalinux.org/8/ALSA-2022-1932.html< / a > < br > < a href = "https://github.com/advisories/GHSA-55x5-fj6c-h6m8" > https://github.com/advisories/GHSA-55x5-fj6c-h6m8< / a > < br > < a href = "https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt" > https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt< / a > < br > < a href = "https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a" > https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a< / a > < br > < a href = "https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a (lxml-4.6.5)" > https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a (lxml-4.6.5)< / a > < br > < a href = "https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776" > https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776< / a > < br > < a href = "https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0" > https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0< / a > < br > < a href = "https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 (lxml-4.6.5)" > https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 (lxml-4.6.5)< / a > < br > < a href = "https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8" > https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-43818.html" > https://linux.oracle.com/cve/CVE-2021-43818.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9341.html" > https://linux.oracle.com/errata/ELSA-2022-9341.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43818" > https://nvd.nist.gov/vuln/detail/CVE-2021-43818< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220107-0005/" > https://security.netapp.com/advisory/ntap-20220107-0005/< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5225-1" > https://ubuntu.com/security/notices/USN-5225-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5043" > https://www.debian.org/security/2022/dsa-5043< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| pip | CVE-2019-20916 | HIGH | 18.1 | 19.2 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html" > http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-20916" > https://access.redhat.com/security/cve/CVE-2019-20916< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2020-4654.html" > https://errata.almalinux.org/8/ALSA-2020-4654.html< / a > < br > < a href = "https://github.com/advisories/GHSA-gpvv-69j7-gwj8" > https://github.com/advisories/GHSA-gpvv-69j7-gwj8< / a > < br > < a href = "https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace" > https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace< / a > < br > < a href = "https://github.com/pypa/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace (19.2)" > https://github.com/pypa/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace (19.2)< / a > < br > < a href = "https://github.com/pypa/pip/compare/19.1.1...19.2" > https://github.com/pypa/pip/compare/19.1.1...19.2< / a > < br > < a href = "https://github.com/pypa/pip/issues/6413" > https://github.com/pypa/pip/issues/6413< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2019-20916.html" > https://linux.oracle.com/cve/CVE-2019-20916.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9204.html" > https://linux.oracle.com/errata/ELSA-2022-9204.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html" > https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20916" > https://nvd.nist.gov/vuln/detail/CVE-2019-20916< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4601-1" > https://ubuntu.com/security/notices/USN-4601-1< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| pip | CVE-2021-3572 | MEDIUM | 18.1 | 21.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2021:3254" > https://access.redhat.com/errata/RHSA-2021:3254< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3572" > https://access.redhat.com/security/cve/CVE-2021-3572< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1962856" > https://bugzilla.redhat.com/show_bug.cgi?id=1962856< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572< / a > < br > < a href = "https://github.com/advisories/GHSA-5xp3-jfq3-5q8x" > https://github.com/advisories/GHSA-5xp3-jfq3-5q8x< / a > < br > < a href = "https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b" > https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b< / a > < br > < a href = "https://github.com/pypa/pip/issues/10042" > https://github.com/pypa/pip/issues/10042< / a > < br > < a href = "https://github.com/pypa/pip/issues/10042#issuecomment-857452480" > https://github.com/pypa/pip/issues/10042#issuecomment-857452480< / a > < br > < a href = "https://github.com/pypa/pip/pull/9827" > https://github.com/pypa/pip/pull/9827< / a > < br > < a href = "https://github.com/skazi0/CVE-2021-3572/blob/master/CVE-2021-3572-v9.0.1.patch" > https://github.com/skazi0/CVE-2021-3572/blob/master/CVE-2021-3572-v9.0.1.patch< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3572.html" > https://linux.oracle.com/cve/CVE-2021-3572.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4455.html" > https://linux.oracle.com/errata/ELSA-2021-4455.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3572" > https://nvd.nist.gov/vuln/detail/CVE-2021-3572< / a > < br > < a href = "https://packetstormsecurity.com/files/162712/USN-4961-1.txt" > https://packetstormsecurity.com/files/162712/USN-4961-1.txt< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |