2021-12-12 22:42:29 +00:00
---
hide:
- toc
---
# Security Overview
< link href = "https://truecharts.org/_static/trivy.css" type = "text/css" rel = "stylesheet" / >
## Helm-Chart
##### Scan Results
#### Chart Object: dillinger/templates/common.yaml
2021-12-13 11:05:05 +00:00
2021-12-12 22:42:29 +00:00
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' RELEASE-NAME-dillinger' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | < details > < summary > Expand...< / summary > A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.allowPrivilegeEscalation' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv001" > https://avd.aquasec.com/misconfig/ksv001< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' RELEASE-NAME-dillinger' of Deployment ' RELEASE-NAME-dillinger' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | < details > < summary > Expand...< / summary > The container should drop all default capabilities and add only those that are needed for its execution. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should add ' ALL' to ' securityContext.capabilities.drop' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/" > https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv003" > https://avd.aquasec.com/misconfig/ksv003< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' RELEASE-NAME-dillinger' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | < details > < summary > Expand...< / summary > ' runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.runAsNonRoot' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv012" > https://avd.aquasec.com/misconfig/ksv012< / a > < br > < / details > |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | < details > < summary > Expand...< / summary > An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.readOnlyRootFilesystem' to true < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/" > https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv014" > https://avd.aquasec.com/misconfig/ksv014< / a > < br > < / details > |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | < details > < summary > Expand...< / summary > Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.privileged' to false < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv017" > https://avd.aquasec.com/misconfig/ksv017< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-dillinger' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with user ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.runAsUser' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv020" > https://avd.aquasec.com/misconfig/ksv020< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' RELEASE-NAME-dillinger' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | < details > < summary > Expand...< / summary > Force the container to run with group ID > 10000 to avoid conflicts with the host’ s user table. < br > < hr > < br > Container ' prepare' of Deployment ' RELEASE-NAME-dillinger' should set ' securityContext.runAsGroup' > 10000 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubesec.io/basics/containers-securitycontext-runasuser/" > https://kubesec.io/basics/containers-securitycontext-runasuser/< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv021" > https://avd.aquasec.com/misconfig/ksv021< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | < details > < summary > Expand...< / summary > The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. < br > < hr > < br > Either Pod or Container should set ' securityContext.seccompProfile.type' to ' RuntimeDefault' < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv030" > https://avd.aquasec.com/misconfig/ksv030< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | < details > < summary > Expand...< / summary > Containers should be forbidden from running with a root UID. < br > < hr > < br > securityContext.runAsUser should be set to a value greater than 0 < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv105" > https://avd.aquasec.com/misconfig/ksv105< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | < details > < summary > Expand...< / summary > Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. < br > < hr > < br > container should drop all < / details > | < details > < summary > Expand...< / summary > < a href = "https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted" > https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted< / a > < br > < a href = "https://avd.aquasec.com/misconfig/ksv106" > https://avd.aquasec.com/misconfig/ksv106< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
## Containers
##### Detected Containers
2022-07-04 22:32:57 +00:00
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
2021-12-12 22:42:29 +00:00
tccr.io/truecharts/dillinger:v3.39.1
##### Scan Results
2022-07-04 22:32:57 +00:00
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
2021-12-13 11:05:05 +00:00
2021-12-12 22:42:29 +00:00
2022-07-04 22:32:57 +00:00
**ubuntu**
2022-06-21 09:20:23 +00:00
2022-07-04 22:32:57 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/oss-sec/2016/q1/452" > http://seclists.org/oss-sec/2016/q1/452< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/2" > http://www.openwall.com/lists/oss-security/2016/02/28/2< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2016/02/28/3" > http://www.openwall.com/lists/oss-security/2016/02/28/3< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-2781" > https://access.redhat.com/security/cve/CVE-2016-2781< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://lore.kernel.org/patchwork/patch/793178/" > https://lore.kernel.org/patchwork/patch/793178/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-2781" > https://nvd.nist.gov/vuln/detail/CVE-2016-2781< / a > < br > < / details > |
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32206" > https://access.redhat.com/security/cve/CVE-2022-32206< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32206.html" > https://curl.se/docs/CVE-2022-32206.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < / details > |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-32208" > https://access.redhat.com/security/cve/CVE-2022-32208< / a > < br > < a href = "https://curl.se/docs/CVE-2022-32208.html" > https://curl.se/docs/CVE-2022-32208.html< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5495-1" > https://ubuntu.com/security/notices/USN-5495-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5499-1" > https://ubuntu.com/security/notices/USN-5499-1< / a > < br > < / details > |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-43618" > https://access.redhat.com/security/cve/CVE-2021-43618< / a > < br > < a href = "https://bugs.debian.org/994405" > https://bugs.debian.org/994405< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618< / a > < br > < a href = "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" > https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html< / a > < br > < a href = "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" > https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" > https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43618" > https://nvd.nist.gov/vuln/detail/CVE-2021-43618< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-36222" > https://access.redhat.com/security/cve/CVE-2021-36222< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222< / a > < br > < a href = "https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562" > https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-36222.html" > https://linux.oracle.com/cve/CVE-2021-36222.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3576.html" > https://linux.oracle.com/errata/ELSA-2021-3576.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-36222" > https://nvd.nist.gov/vuln/detail/CVE-2021-36222< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211022-0003/" > https://security.netapp.com/advisory/ntap-20211022-0003/< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0007/" > https://security.netapp.com/advisory/ntap-20211104-0007/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4944" > https://www.debian.org/security/2021/dsa-4944< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-37750" > https://access.redhat.com/security/cve/CVE-2021-37750< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750< / a > < br > < a href = "https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49" > https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49< / a > < br > < a href = "https://github.com/krb5/krb5/releases" > https://github.com/krb5/krb5/releases< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-37750.html" > https://linux.oracle.com/cve/CVE-2021-37750.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-4788.html" > https://linux.oracle.com/errata/ELSA-2021-4788.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html" > https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-37750" > https://nvd.nist.gov/vuln/detail/CVE-2021-37750< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210923-0002/" > https://security.netapp.com/advisory/ntap-20210923-0002/< / a > < br > < a href = "https://web.mit.edu/kerberos/advisories/" > https://web.mit.edu/kerberos/advisories/< / a > < br > < / details > |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1586" > https://access.redhat.com/security/cve/CVE-2022-1586< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077976," > https://bugzilla.redhat.com/show_bug.cgi?id=2077976,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a," > https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c" > https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1586.html" > https://linux.oracle.com/cve/CVE-2022-1586.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1586" > https://nvd.nist.gov/vuln/detail/CVE-2022-1586< / a > < br > < / details > |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1587" > https://access.redhat.com/security/cve/CVE-2022-1587< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2077983," > https://bugzilla.redhat.com/show_bug.cgi?id=2077983,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587< / a > < br > < a href = "https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0" > https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1587.html" > https://linux.oracle.com/cve/CVE-2022-1587.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5251.html" > https://linux.oracle.com/errata/ELSA-2022-5251.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1587" > https://nvd.nist.gov/vuln/detail/CVE-2022-1587< / a > < br > < / details > |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://openwall.com/lists/oss-security/2017/07/11/3" > http://openwall.com/lists/oss-security/2017/07/11/3< / a > < br > < a href = "http://www.securityfocus.com/bid/99575" > http://www.securityfocus.com/bid/99575< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-11164" > https://access.redhat.com/security/cve/CVE-2017-11164< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < / details > |
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/HT211168" > https://support.apple.com/HT211168< / a > < br > < a href = "https://support.apple.com/HT211170" > https://support.apple.com/HT211170< / a > < br > < a href = "https://support.apple.com/HT211171" > https://support.apple.com/HT211171< / a > < br > < a href = "https://support.apple.com/HT211175" > https://support.apple.com/HT211175< / a > < br > < a href = "https://support.apple.com/HT211178" > https://support.apple.com/HT211178< / a > < br > < a href = "https://support.apple.com/HT211179" > https://support.apple.com/HT211179< / a > < br > < a href = "https://support.apple.com/HT211181" > https://support.apple.com/HT211181< / a > < br > < a href = "https://vuldb.com/?id.155768" > https://vuldb.com/?id.155768< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/en-us/HT211935" > https://support.apple.com/en-us/HT211935< / a > < br > < a href = "https://support.apple.com/en-us/HT211952" > https://support.apple.com/en-us/HT211952< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/< / a > < br > < / details > |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2020/Dec/32" > http://seclists.org/fulldisclosure/2020/Dec/32< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://support.apple.com/en-us/HT211843" > https://support.apple.com/en-us/HT211843< / a > < br > < a href = "https://support.apple.com/en-us/HT211844" > https://support.apple.com/en-us/HT211844< / a > < br > < a href = "https://support.apple.com/en-us/HT211847" > https://support.apple.com/en-us/HT211847< / a > < br > < a href = "https://support.apple.com/en-us/HT211850" > https://support.apple.com/en-us/HT211850< / a > < br > < a href = "https://support.apple.com/en-us/HT211931" > https://support.apple.com/en-us/HT211931< / a > < br > < a href = "https://support.apple.com/kb/HT211846" > https://support.apple.com/kb/HT211846< / a > < br > < a href = "https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/" > https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/< / a > < br > < / details > |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3671" > https://access.redhat.com/security/cve/CVE-2021-3671< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2013080," > https://bugzilla.redhat.com/show_bug.cgi?id=2013080,< / a > < br > < a href = "https://bugzilla.samba.org/show_bug.cgi?id=14770," > https://bugzilla.samba.org/show_bug.cgi?id=14770,< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671< / a > < br > < a href = "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a" > https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3671" > https://nvd.nist.gov/vuln/detail/CVE-2021-3671< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5142-1" > https://ubuntu.com/security/notices/USN-5142-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5174-1" > https://ubuntu.com/security/notices/USN-5174-1< / a > < br > < / details > |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | < details > < summary > Expand...< / summary > < a href = "https://akkadia.org/drepper/SHA-crypt.txt" > https://akkadia.org/drepper/SHA-crypt.txt< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013< / a > < br > < a href = "https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/" > https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/< / a > < br > < a href = "https://twitter.com/solardiz/status/795601240151457793" > https://twitter.com/solardiz/status/795601240151457793< / a > < br > < / details > |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1304" > https://access.redhat.com/security/cve/CVE-2022-1304< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" > https://bugzilla.redhat.com/show_bug.cgi?id=2069726< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304< / a > < br > < a href = "https://marc.info/?l=linux-ext4&m=165056234501732&w=2" > https://marc.info/?l=linux-ext4& m=165056234501732& w=2< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1304" > https://nvd.nist.gov/vuln/detail/CVE-2022-1304< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5464-1" > https://ubuntu.com/security/notices/USN-5464-1< / a > < br > < / details > |
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html" > http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-27928" > https://access.redhat.com/security/cve/CVE-2021-27928< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25179" > https://jira.mariadb.org/browse/MDEV-25179< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-27928.html" > https://linux.oracle.com/cve/CVE-2021-27928.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-1242.html" > https://linux.oracle.com/errata/ELSA-2021-1242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10237-release-notes/" > https://mariadb.com/kb/en/mariadb-10237-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10328-release-notes/" > https://mariadb.com/kb/en/mariadb-10328-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-10418-release-notes/" > https://mariadb.com/kb/en/mariadb-10418-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/mariadb-1059-release-notes/" > https://mariadb.com/kb/en/mariadb-1059-release-notes/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-27928" > https://nvd.nist.gov/vuln/detail/CVE-2021-27928< / a > < br > < a href = "https://security.gentoo.org/glsa/202105-28" > https://security.gentoo.org/glsa/202105-28< / a > < br > < / details > |
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46662" > https://access.redhat.com/security/cve/CVE-2021-46662< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-22464" > https://jira.mariadb.org/browse/MDEV-22464< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25637" > https://jira.mariadb.org/browse/MDEV-25637< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46662.html" > https://linux.oracle.com/cve/CVE-2021-46662.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46662" > https://nvd.nist.gov/vuln/detail/CVE-2021-46662< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46666" > https://access.redhat.com/security/cve/CVE-2021-46666< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25635" > https://jira.mariadb.org/browse/MDEV-25635< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46666.html" > https://linux.oracle.com/cve/CVE-2021-46666.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46666" > https://nvd.nist.gov/vuln/detail/CVE-2021-46666< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46667" > https://access.redhat.com/security/cve/CVE-2021-46667< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-26350" > https://jira.mariadb.org/browse/MDEV-26350< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-46667.html" > https://linux.oracle.com/cve/CVE-2021-46667.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-1557.html" > https://linux.oracle.com/errata/ELSA-2022-1557.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46667" > https://nvd.nist.gov/vuln/detail/CVE-2021-46667< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-46669" > https://access.redhat.com/security/cve/CVE-2021-46669< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669< / a > < br > < a href = "https://jira.mariadb.org/browse/MDEV-25638" > https://jira.mariadb.org/browse/MDEV-25638< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/< / a > < br > < a href = "https://mariadb.com/kb/en/security/" > https://mariadb.com/kb/en/security/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-46669" > https://nvd.nist.gov/vuln/detail/CVE-2021-46669< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220221-0002/" > https://security.netapp.com/advisory/ntap-20220221-0002/< / a > < br > < / details > |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" > http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1& content-type=text/x-cvsweb-markup< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-39537" > https://access.redhat.com/security/cve/CVE-2021-39537< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" > https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" > https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-39537" > https://nvd.nist.gov/vuln/detail/CVE-2021-39537< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29458" > https://access.redhat.com/security/cve/CVE-2022-29458< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458< / a > < br > < a href = "https://invisible-island.net/ncurses/NEWS.html#t20220416" > https://invisible-island.net/ncurses/NEWS.html#t20220416< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html< / a > < br > < a href = "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html" > https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29458" > https://nvd.nist.gov/vuln/detail/CVE-2022-29458< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5477-1" > https://ubuntu.com/security/notices/USN-5477-1< / a > < br > < / details > |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-2068" > https://access.redhat.com/security/cve/CVE-2022-2068< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9< / a > < br > < a href = "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" > https://nvd.nist.gov/vuln/detail/CVE-2022-2068< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5488-1" > https://ubuntu.com/security/notices/USN-5488-1< / a > < br > < a href = "https://www.debian.org/security/2022/dsa-5169" > https://www.debian.org/security/2022/dsa-5169< / a > < br > < a href = "https://www.openssl.org/news/secadv/20220621.txt" > https://www.openssl.org/news/secadv/20220621.txt< / a > < br > < / details > |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2013-4235" > https://access.redhat.com/security/cve/CVE-2013-4235< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2013-4235" > https://access.redhat.com/security/cve/cve-2013-4235< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235" > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235< / a > < br > < a href = "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" > https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E< / a > < br > < a href = "https://security-tracker.debian.org/tracker/CVE-2013-4235" > https://security-tracker.debian.org/tracker/CVE-2013-4235< / a > < br > < / details > |
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | < details > < summary > Expand...< / summary > < a href = "http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html" > http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-16156" > https://access.redhat.com/security/cve/CVE-2020-16156< / a > < br > < a href = "https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/" > https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/< / a > < br > < a href = "https://metacpan.org/pod/distribution/CPAN/scripts/cpan" > https://metacpan.org/pod/distribution/CPAN/scripts/cpan< / a > < br > < / details > |
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-14147" > https://access.redhat.com/security/cve/CVE-2020-14147< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147< / a > < br > < a href = "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571" > https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571< / a > < br > < a href = "https://github.com/antirez/redis/pull/6875" > https://github.com/antirez/redis/pull/6875< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-14147" > https://nvd.nist.gov/vuln/detail/CVE-2020-14147< / a > < br > < a href = "https://security.gentoo.org/glsa/202008-17" > https://security.gentoo.org/glsa/202008-17< / a > < br > < a href = "https://www.debian.org/security/2020/dsa-4731" > https://www.debian.org/security/2020/dsa-4731< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32626" > https://access.redhat.com/security/cve/CVE-2021-32626< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591" > https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" > https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32626.html" > https://linux.oracle.com/cve/CVE-2021-32626.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E" > https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" > https://nvd.nist.gov/vuln/detail/CVE-2021-32626< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32627" > https://access.redhat.com/security/cve/CVE-2021-32627< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" > https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32627.html" > https://linux.oracle.com/cve/CVE-2021-32627.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" > https://nvd.nist.gov/vuln/detail/CVE-2021-32627< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32628" > https://access.redhat.com/security/cve/CVE-2021-32628< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3" > https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" > https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32628.html" > https://linux.oracle.com/cve/CVE-2021-32628.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" > https://nvd.nist.gov/vuln/detail/CVE-2021-32628< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32672" > https://access.redhat.com/security/cve/CVE-2021-32672< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672< / a > < br > < a href = "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd" > https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" > https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" > https://nvd.nist.gov/vuln/detail/CVE-2021-32672< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32675" > https://access.redhat.com/security/cve/CVE-2021-32675< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8" > https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" > https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32675.html" > https://linux.oracle.com/cve/CVE-2021-32675.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E" > https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" > https://nvd.nist.gov/vuln/detail/CVE-2021-32675< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32687" > https://access.redhat.com/security/cve/CVE-2021-32687< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f" > https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" > https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-32687.html" > https://linux.oracle.com/cve/CVE-2021-32687.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" > https://nvd.nist.gov/vuln/detail/CVE-2021-32687< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-41099" > https://access.redhat.com/security/cve/CVE-2021-41099< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3945.html" > https://errata.almalinux.org/8/ALSA-2021-3945.html< / a > < br > < a href = "https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521" > https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521< / a > < br > < a href = "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" > https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-41099.html" > https://linux.oracle.com/cve/CVE-2021-41099.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3945.html" > https://linux.oracle.com/errata/ELSA-2021-3945.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" > https://nvd.nist.gov/vuln/detail/CVE-2021-41099< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20211104-0003/" > https://security.netapp.com/advisory/ntap-20211104-0003/< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-5001" > https://www.debian.org/security/2021/dsa-5001< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-31879" > https://access.redhat.com/security/cve/CVE-2021-31879< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879< / a > < br > < a href = "https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html" > https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-31879" > https://nvd.nist.gov/vuln/detail/CVE-2021-31879< / a > < br > < a href = "https://savannah.gnu.org/bugs/?56909" > https://savannah.gnu.org/bugs/?56909< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210618-0002/" > https://security.netapp.com/advisory/ntap-20210618-0002/< / a > < br > < / details > |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4166" > https://access.redhat.com/security/cve/CVE-2021-4166< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682< / a > < br > < a href = "https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)" > https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)< / a > < br > < a href = "https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035" > https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4166" > https://nvd.nist.gov/vuln/detail/CVE-2021-4166< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < / details > |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4192" > https://access.redhat.com/security/cve/CVE-2021-4192< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192< / a > < br > < a href = "https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952" > https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22< / a > < br > < a href = "https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/" > https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4192.html" > https://linux.oracle.com/cve/CVE-2021-4192.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4192" > https://nvd.nist.gov/vuln/detail/CVE-2021-4192< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2022-0213" > https://access.redhat.com/security/cve/CVE-2022-0213< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213< / a > < br > < a href = "https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26" > https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26< / a > < br > < a href = "https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed" > https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0261" > https://access.redhat.com/security/cve/CVE-2022-0261< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc< / a > < br > < a href = "https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)" > https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)< / a > < br > < a href = "https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82" > https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0261.html" > https://linux.oracle.com/cve/CVE-2022-0261.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0261" > https://nvd.nist.gov/vuln/detail/CVE-2022-0261< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0318" > https://access.redhat.com/security/cve/CVE-2022-0318< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318< / a > < br > < a href = "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" > https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc< / a > < br > < a href = "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" > https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0318.html" > https://linux.oracle.com/cve/CVE-2022-0318.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0318" > https://nvd.nist.gov/vuln/detail/CVE-2022-0318< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0319" > https://access.redhat.com/security/cve/CVE-2022-0319< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319< / a > < br > < a href = "https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9" > https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9< / a > < br > < a href = "https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b" > https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0351" > https://access.redhat.com/security/cve/CVE-2022-0351< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d< / a > < br > < a href = "https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)" > https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)< / a > < br > < a href = "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161" > https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0359" > https://access.redhat.com/security/cve/CVE-2022-0359< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1< / a > < br > < a href = "https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)" > https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)< / a > < br > < a href = "https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def" > https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0359.html" > https://linux.oracle.com/cve/CVE-2022-0359.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0359" > https://nvd.nist.gov/vuln/detail/CVE-2022-0359< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0361" > https://access.redhat.com/security/cve/CVE-2022-0361< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366< / a > < br > < a href = "https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)" > https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)< / a > < br > < a href = "https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b" > https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0361.html" > https://linux.oracle.com/cve/CVE-2022-0361.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0361" > https://nvd.nist.gov/vuln/detail/CVE-2022-0361< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0368" > https://access.redhat.com/security/cve/CVE-2022-0368< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa< / a > < br > < a href = "https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)" > https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9< / a > < br > < a href = "https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/" > https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0368" > https://nvd.nist.gov/vuln/detail/CVE-2022-0368< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0392" > https://access.redhat.com/security/cve/CVE-2022-0392< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a< / a > < br > < a href = "https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)" > https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)< / a > < br > < a href = "https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126" > https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0392.html" > https://linux.oracle.com/cve/CVE-2022-0392.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0392" > https://nvd.nist.gov/vuln/detail/CVE-2022-0392< / a > < br > < / details > |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0408" > https://access.redhat.com/security/cve/CVE-2022-0408< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31< / a > < br > < a href = "https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)" > https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)< / a > < br > < a href = "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d" > https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0408" > https://nvd.nist.gov/vuln/detail/CVE-2022-0408< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0413" > https://access.redhat.com/security/cve/CVE-2022-0413< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413< / a > < br > < a href = "https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a" > https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a< / a > < br > < a href = "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38" > https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0413.html" > https://linux.oracle.com/cve/CVE-2022-0413.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0894.html" > https://linux.oracle.com/errata/ELSA-2022-0894.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0413" > https://nvd.nist.gov/vuln/detail/CVE-2022-0413< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0417" > https://access.redhat.com/security/cve/CVE-2022-0417< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417< / a > < br > < a href = "https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a" > https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a< / a > < br > < a href = "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a" > https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0417" > https://nvd.nist.gov/vuln/detail/CVE-2022-0417< / a > < br > < / details > |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0554" > https://access.redhat.com/security/cve/CVE-2022-0554< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554< / a > < br > < a href = "https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8" > https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8< / a > < br > < a href = "https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71" > https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0554.html" > https://linux.oracle.com/cve/CVE-2022-0554.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0554" > https://nvd.nist.gov/vuln/detail/CVE-2022-0554< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0572" > https://access.redhat.com/security/cve/CVE-2022-0572< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f< / a > < br > < a href = "https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)" > https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)< / a > < br > < a href = "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf" > https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0572" > https://nvd.nist.gov/vuln/detail/CVE-2022-0572< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0629" > https://access.redhat.com/security/cve/CVE-2022-0629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629< / a > < br > < a href = "https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc" > https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc< / a > < br > < a href = "https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877" > https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0629" > https://nvd.nist.gov/vuln/detail/CVE-2022-0629< / a > < br > < / details > |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0685" > https://access.redhat.com/security/cve/CVE-2022-0685< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87< / a > < br > < a href = "https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)" > https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)< / a > < br > < a href = "https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782" > https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0685" > https://nvd.nist.gov/vuln/detail/CVE-2022-0685< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0714" > https://access.redhat.com/security/cve/CVE-2022-0714< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa< / a > < br > < a href = "https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)" > https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)< / a > < br > < a href = "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3" > https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0714" > https://nvd.nist.gov/vuln/detail/CVE-2022-0714< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0943" > https://access.redhat.com/security/cve/CVE-2022-0943< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3< / a > < br > < a href = "https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)" > https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)< / a > < br > < a href = "https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1" > https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-0943.html" > https://linux.oracle.com/cve/CVE-2022-0943.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0943" > https://nvd.nist.gov/vuln/detail/CVE-2022-0943< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1154" > https://access.redhat.com/security/cve/CVE-2022-1154< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154< / a > < br > < a href = "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5" > https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5< / a > < br > < a href = "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425" > https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1154.html" > https://linux.oracle.com/cve/CVE-2022-1154.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1154" > https://nvd.nist.gov/vuln/detail/CVE-2022-1154< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1420" > https://access.redhat.com/security/cve/CVE-2022-1420< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca< / a > < br > < a href = "https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)" > https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)< / a > < br > < a href = "https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326" > https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1420.html" > https://linux.oracle.com/cve/CVE-2022-1420.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5242.html" > https://linux.oracle.com/errata/ELSA-2022-5242.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1420" > https://nvd.nist.gov/vuln/detail/CVE-2022-1420< / a > < br > < / details > |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1616" > https://access.redhat.com/security/cve/CVE-2022-1616< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c< / a > < br > < a href = "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)" > https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)< / a > < br > < a href = "https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2" > https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1616" > https://nvd.nist.gov/vuln/detail/CVE-2022-1616< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1619" > https://access.redhat.com/security/cve/CVE-2022-1619< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619< / a > < br > < a href = "https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe" > https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe< / a > < br > < a href = "https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450" > https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1619" > https://nvd.nist.gov/vuln/detail/CVE-2022-1619< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1620" > https://access.redhat.com/security/cve/CVE-2022-1620< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620< / a > < br > < a href = "https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f" > https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f< / a > < br > < a href = "https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51" > https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1620" > https://nvd.nist.gov/vuln/detail/CVE-2022-1620< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1621" > https://access.redhat.com/security/cve/CVE-2022-1621< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b< / a > < br > < a href = "https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)" > https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)< / a > < br > < a href = "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb" > https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1621.html" > https://linux.oracle.com/cve/CVE-2022-1621.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1621" > https://nvd.nist.gov/vuln/detail/CVE-2022-1621< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1629" > https://access.redhat.com/security/cve/CVE-2022-1629< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629< / a > < br > < a href = "https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd" > https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd< / a > < br > < a href = "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee" > https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2022-1629.html" > https://linux.oracle.com/cve/CVE-2022-1629.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-5319.html" > https://linux.oracle.com/errata/ELSA-2022-5319.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1629" > https://nvd.nist.gov/vuln/detail/CVE-2022-1629< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1851" > https://access.redhat.com/security/cve/CVE-2022-1851< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851< / a > < br > < a href = "https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad" > https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad< / a > < br > < a href = "https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d" > https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1851" > https://nvd.nist.gov/vuln/detail/CVE-2022-1851< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1927" > https://access.redhat.com/security/cve/CVE-2022-1927< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010< / a > < br > < a href = "https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)" > https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)< / a > < br > < a href = "https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777" > https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1942" > https://access.redhat.com/security/cve/CVE-2022-1942< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d< / a > < br > < a href = "https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)" > https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)< / a > < br > < a href = "https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071" > https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < / details > |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1968" > https://access.redhat.com/security/cve/CVE-2022-1968< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968< / a > < br > < a href = "https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895" > https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b< / a > < br > < a href = "https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/" > https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < / details > |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-3973" > https://access.redhat.com/security/cve/CVE-2021-3973< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847< / a > < br > < a href = "https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)" > https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)< / a > < br > < a href = "https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e" > https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3973" > https://nvd.nist.gov/vuln/detail/CVE-2021-3973< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5247-1" > https://ubuntu.com/security/notices/USN-5247-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5433-1" > https://ubuntu.com/security/notices/USN-5433-1< / a > < br > < / details > |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "http://seclists.org/fulldisclosure/2022/Mar/29" > http://seclists.org/fulldisclosure/2022/Mar/29< / a > < br > < a href = "http://seclists.org/fulldisclosure/2022/May/35" > http://seclists.org/fulldisclosure/2022/May/35< / a > < br > < a href = "http://www.openwall.com/lists/oss-security/2022/01/15/1" > http://www.openwall.com/lists/oss-security/2022/01/15/1< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-4193" > https://access.redhat.com/security/cve/CVE-2021-4193< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193< / a > < br > < a href = "https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b" > https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0< / a > < br > < a href = "https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/" > https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-4193.html" > https://linux.oracle.com/cve/CVE-2021-4193.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0366.html" > https://linux.oracle.com/errata/ELSA-2022-0366.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-4193" > https://nvd.nist.gov/vuln/detail/CVE-2021-4193< / a > < br > < a href = "https://support.apple.com/kb/HT213183" > https://support.apple.com/kb/HT213183< / a > < br > < a href = "https://support.apple.com/kb/HT213256" > https://support.apple.com/kb/HT213256< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0443" > https://access.redhat.com/security/cve/CVE-2022-0443< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461< / a > < br > < a href = "https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)" > https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)< / a > < br > < a href = "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51" > https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html" > https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0443" > https://nvd.nist.gov/vuln/detail/CVE-2022-0443< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5458-1" > https://ubuntu.com/security/notices/USN-5458-1< / a > < br > < / details > |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0729" > https://access.redhat.com/security/cve/CVE-2022-0729< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30< / a > < br > < a href = "https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)" > https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)< / a > < br > < a href = "https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea" > https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html" > https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0729" > https://nvd.nist.gov/vuln/detail/CVE-2022-0729< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5460-1" > https://ubuntu.com/security/notices/USN-5460-1< / a > < br > < / details > |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1733" > https://access.redhat.com/security/cve/CVE-2022-1733< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733< / a > < br > < a href = "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813" > https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813< / a > < br > < a href = "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a" > https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1733" > https://nvd.nist.gov/vuln/detail/CVE-2022-1733< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1735" > https://access.redhat.com/security/cve/CVE-2022-1735< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735< / a > < br > < a href = "https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97" > https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97< / a > < br > < a href = "https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9" > https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1735" > https://nvd.nist.gov/vuln/detail/CVE-2022-1735< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1785" > https://access.redhat.com/security/cve/CVE-2022-1785< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785< / a > < br > < a href = "https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839" > https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839< / a > < br > < a href = "https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109" > https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1785" > https://nvd.nist.gov/vuln/detail/CVE-2022-1785< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1796" > https://access.redhat.com/security/cve/CVE-2022-1796< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796< / a > < br > < a href = "https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5" > https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5< / a > < br > < a href = "https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e" > https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1796" > https://nvd.nist.gov/vuln/detail/CVE-2022-1796< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-1898" > https://access.redhat.com/security/cve/CVE-2022-1898< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898< / a > < br > < a href = "https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a" > https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a< / a > < br > < a href = "https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea" > https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html" > https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-1898" > https://nvd.nist.gov/vuln/detail/CVE-2022-1898< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5498-1" > https://ubuntu.com/security/notices/USN-5498-1< / a > < br > < / details > |
2022-06-21 09:20:23 +00:00
#### Container: tccr.io/truecharts/dillinger:v3.39.1 (alpine 3.15)
**alpine**
| No Vulnerabilities found |
|:---------------------------------|
2021-12-13 11:05:05 +00:00
2021-12-12 22:42:29 +00:00
**node-pkg**
2021-12-13 11:05:05 +00:00
2021-12-12 22:42:29 +00:00
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| acorn | GHSA-6chw-6frg-f759 | HIGH | 5.7.3 | 5.7.4, 7.1.1, 6.4.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802" > https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802< / a > < br > < a href = "https://github.com/acornjs/acorn/issues/929" > https://github.com/acornjs/acorn/issues/929< / a > < br > < a href = "https://github.com/advisories/GHSA-6chw-6frg-f759" > https://github.com/advisories/GHSA-6chw-6frg-f759< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ACORN-559469" > https://snyk.io/vuln/SNYK-JS-ACORN-559469< / a > < br > < a href = "https://www.npmjs.com/advisories/1488" > https://www.npmjs.com/advisories/1488< / a > < br > < / details > |
| acorn | GHSA-6chw-6frg-f759 | HIGH | 7.1.0 | 5.7.4, 7.1.1, 6.4.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802" > https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802< / a > < br > < a href = "https://github.com/acornjs/acorn/issues/929" > https://github.com/acornjs/acorn/issues/929< / a > < br > < a href = "https://github.com/advisories/GHSA-6chw-6frg-f759" > https://github.com/advisories/GHSA-6chw-6frg-f759< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ACORN-559469" > https://snyk.io/vuln/SNYK-JS-ACORN-559469< / a > < br > < a href = "https://www.npmjs.com/advisories/1488" > https://www.npmjs.com/advisories/1488< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| ajv | CVE-2020-15366 | MEDIUM | 6.10.2 | 6.12.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-15366" > https://access.redhat.com/security/cve/CVE-2020-15366< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0551.html" > https://errata.almalinux.org/8/ALSA-2021-0551.html< / a > < br > < a href = "https://github.com/advisories/GHSA-v88g-cgmw-v5xw" > https://github.com/advisories/GHSA-v88g-cgmw-v5xw< / a > < br > < a href = "https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f" > https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f< / a > < br > < a href = "https://github.com/ajv-validator/ajv/releases/tag/v6.12.3" > https://github.com/ajv-validator/ajv/releases/tag/v6.12.3< / a > < br > < a href = "https://github.com/ajv-validator/ajv/tags" > https://github.com/ajv-validator/ajv/tags< / a > < br > < a href = "https://hackerone.com/bugs?subject=user&report_id=894259" > https://hackerone.com/bugs?subject=user& report_id=894259< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-15366.html" > https://linux.oracle.com/cve/CVE-2020-15366.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0551.html" > https://linux.oracle.com/errata/ELSA-2021-0551.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" > https://nvd.nist.gov/vuln/detail/CVE-2020-15366< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-AJV-584908" > https://snyk.io/vuln/SNYK-JS-AJV-584908< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| angular | CVE-2020-7676 | MEDIUM | 1.7.9 | 1.8.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7676" > https://access.redhat.com/security/cve/CVE-2020-7676< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7676" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7676< / a > < br > < a href = "https://github.com/advisories/GHSA-mhp6-pxh8-r675" > https://github.com/advisories/GHSA-mhp6-pxh8-r675< / a > < br > < a href = "https://github.com/angular/angular.js/pull/17028" > https://github.com/angular/angular.js/pull/17028< / a > < br > < a href = "https://github.com/angular/angular.js/pull/17028," > https://github.com/angular/angular.js/pull/17028,< / a > < br > < a href = "https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E" > https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E" > https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7676" > https://nvd.nist.gov/vuln/detail/CVE-2020-7676< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ANGULAR-570058" > https://snyk.io/vuln/SNYK-JS-ANGULAR-570058< / a > < br > < / details > |
2022-07-04 22:32:57 +00:00
| angular | CVE-2022-25844 | MEDIUM | 1.7.9 | | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-25844" > https://access.redhat.com/security/cve/CVE-2022-25844< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25844" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25844< / a > < br > < a href = "https://github.com/advisories/GHSA-m2h2-264f-f486" > https://github.com/advisories/GHSA-m2h2-264f-f486< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-25844" > https://nvd.nist.gov/vuln/detail/CVE-2022-25844< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20220629-0009/" > https://security.netapp.com/advisory/ntap-20220629-0009/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735" > https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735< / a > < br > < a href = "https://stackblitz.com/edit/angularjs-material-blank-zvtdvb" > https://stackblitz.com/edit/angularjs-material-blank-zvtdvb< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| angular | GHSA-5cp4-xmrw-59wf | MEDIUM | 1.7.9 | 1.8.0 | < details > < summary > Expand...< / summary > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/< / a > < br > < a href = "https://github.com/advisories/GHSA-5cp4-xmrw-59wf" > https://github.com/advisories/GHSA-5cp4-xmrw-59wf< / a > < br > < a href = "https://github.com/advisories/GHSA-mhp6-pxh8-r675" > https://github.com/advisories/GHSA-mhp6-pxh8-r675< / a > < br > < a href = "https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf" > https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf< / a > < br > < a href = "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2" > https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2< / a > < br > < a href = "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6" > https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-ANGULAR-570058" > https://snyk.io/vuln/SNYK-JS-ANGULAR-570058< / a > < br > < / details > |
2022-05-05 09:00:47 +00:00
| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3807" > https://access.redhat.com/security/cve/CVE-2021-3807< / a > < br > < a href = "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" > https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908< / a > < br > < a href = "https://github.com/advisories/GHSA-93q8-gq69-wqmw" > https://github.com/advisories/GHSA-93q8-gq69-wqmw< / a > < br > < a href = "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" > https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311< / a > < br > < a href = "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" > https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774< / a > < br > < a href = "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" > https://github.com/chalk/ansi-regex/releases/tag/v6.0.1< / a > < br > < a href = "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" > https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3807.html" > https://linux.oracle.com/cve/CVE-2021-3807.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" > https://nvd.nist.gov/vuln/detail/CVE-2021-3807< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < / details > |
| async | CVE-2021-43138 | HIGH | 2.6.3 | 2.6.4, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-fwr7-v2mv-hh25" > https://github.com/advisories/GHSA-fwr7-v2mv-hh25< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/internal/iterator.js" > https://github.com/caolan/async/blob/master/lib/internal/iterator.js< / a > < br > < a href = "https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js" > https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js< / a > < br > < a href = "https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264" > https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264< / a > < br > < a href = "https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2" > https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2< / a > < br > < a href = "https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d" > https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d< / a > < br > < a href = "https://github.com/caolan/async/compare/v2.6.3...v2.6.4" > https://github.com/caolan/async/compare/v2.6.3...v2.6.4< / a > < br > < a href = "https://github.com/caolan/async/pull/1828" > https://github.com/caolan/async/pull/1828< / a > < br > < a href = "https://jsfiddle.net/oz5twjd9/" > https://jsfiddle.net/oz5twjd9/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-43138" > https://nvd.nist.gov/vuln/detail/CVE-2021-43138< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| base64url | NSWG-ECO-428 | HIGH | 0.0.6 | > =3.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/brianloveswords/base64url/pull/25" > https://github.com/brianloveswords/base64url/pull/25< / a > < br > < a href = "https://hackerone.com/reports/321687" > https://hackerone.com/reports/321687< / a > < br > < / details > |
| base64url | GHSA-rvg8-pwq2-xj7q | MEDIUM | 0.0.6 | 3.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-rvg8-pwq2-xj7q" > https://github.com/advisories/GHSA-rvg8-pwq2-xj7q< / a > < br > < a href = "https://github.com/brianloveswords/base64url/pull/25" > https://github.com/brianloveswords/base64url/pull/25< / a > < br > < a href = "https://hackerone.com/reports/321687" > https://hackerone.com/reports/321687< / a > < br > < a href = "https://www.npmjs.com/advisories/658" > https://www.npmjs.com/advisories/658< / a > < br > < / details > |
| base64url | NSWG-ECO-428 | HIGH | 1.0.6 | > =3.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/brianloveswords/base64url/pull/25" > https://github.com/brianloveswords/base64url/pull/25< / a > < br > < a href = "https://hackerone.com/reports/321687" > https://hackerone.com/reports/321687< / a > < br > < / details > |
| base64url | GHSA-rvg8-pwq2-xj7q | MEDIUM | 1.0.6 | 3.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-rvg8-pwq2-xj7q" > https://github.com/advisories/GHSA-rvg8-pwq2-xj7q< / a > < br > < a href = "https://github.com/brianloveswords/base64url/pull/25" > https://github.com/brianloveswords/base64url/pull/25< / a > < br > < a href = "https://hackerone.com/reports/321687" > https://hackerone.com/reports/321687< / a > < br > < a href = "https://www.npmjs.com/advisories/658" > https://www.npmjs.com/advisories/658< / a > < br > < / details > |
2022-05-31 20:26:49 +00:00
| bl | CVE-2020-8244 | MEDIUM | 1.0.3 | 2.2.1, 1.2.3, 4.0.3, 3.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-8244" > https://access.redhat.com/security/cve/CVE-2020-8244< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8244" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8244< / a > < br > < a href = "https://github.com/advisories/GHSA-pp7h-53gx-mx7r" > https://github.com/advisories/GHSA-pp7h-53gx-mx7r< / a > < br > < a href = "https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e" > https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e< / a > < br > < a href = "https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190" > https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190< / a > < br > < a href = "https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466" > https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466< / a > < br > < a href = "https://hackerone.com/reports/966347" > https://hackerone.com/reports/966347< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-8244" > https://nvd.nist.gov/vuln/detail/CVE-2020-8244< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5098-1" > https://ubuntu.com/security/notices/USN-5098-1< / a > < br > < / details > |
| bl | CVE-2020-8244 | MEDIUM | 1.1.2 | 2.2.1, 1.2.3, 4.0.3, 3.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-8244" > https://access.redhat.com/security/cve/CVE-2020-8244< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8244" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8244< / a > < br > < a href = "https://github.com/advisories/GHSA-pp7h-53gx-mx7r" > https://github.com/advisories/GHSA-pp7h-53gx-mx7r< / a > < br > < a href = "https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e" > https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e< / a > < br > < a href = "https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190" > https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190< / a > < br > < a href = "https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466" > https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466< / a > < br > < a href = "https://hackerone.com/reports/966347" > https://hackerone.com/reports/966347< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html" > https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-8244" > https://nvd.nist.gov/vuln/detail/CVE-2020-8244< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-5098-1" > https://ubuntu.com/security/notices/USN-5098-1< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| braces | CVE-2018-1109 | LOW | 1.8.5 | 2.3.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-1109" > https://access.redhat.com/security/cve/CVE-2018-1109< / a > < br > < a href = "https://bugzilla.redhat.com/show_bug.cgi?id=1547272" > https://bugzilla.redhat.com/show_bug.cgi?id=1547272< / a > < br > < a href = "https://github.com/advisories/GHSA-cwfw-4gq5-mrqx" > https://github.com/advisories/GHSA-cwfw-4gq5-mrqx< / a > < br > < a href = "https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451" > https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-1109" > https://nvd.nist.gov/vuln/detail/CVE-2018-1109< / a > < br > < a href = "https://snyk.io/vuln/npm:braces:20180219" > https://snyk.io/vuln/npm:braces:20180219< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| braces | GHSA-g95f-p29q-9xw4 | LOW | 1.8.5 | 2.3.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-g95f-p29q-9xw4" > https://github.com/advisories/GHSA-g95f-p29q-9xw4< / a > < br > < a href = "https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451" > https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451< / a > < br > < a href = "https://snyk.io/vuln/npm:braces:20180219" > https://snyk.io/vuln/npm:braces:20180219< / a > < br > < a href = "https://www.npmjs.com/advisories/786" > https://www.npmjs.com/advisories/786< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| deep-extend | CVE-2018-3750 | CRITICAL | 0.2.11 | 0.5.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-3750" > https://access.redhat.com/security/cve/CVE-2018-3750< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0549.html" > https://errata.almalinux.org/8/ALSA-2021-0549.html< / a > < br > < a href = "https://github.com/advisories/GHSA-hr2v-3952-633q" > https://github.com/advisories/GHSA-hr2v-3952-633q< / a > < br > < a href = "https://hackerone.com/reports/311333" > https://hackerone.com/reports/311333< / a > < br > < a href = "https://nodesecurity.io/advisories/612" > https://nodesecurity.io/advisories/612< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-3750" > https://nvd.nist.gov/vuln/detail/CVE-2018-3750< / a > < br > < a href = "https://www.npmjs.com/advisories/612" > https://www.npmjs.com/advisories/612< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| deep-extend | NSWG-ECO-408 | LOW | 0.2.11 | > =0.5.1 | < details > < summary > Expand...< / summary > < a href = "https://hackerone.com/reports/311333" > https://hackerone.com/reports/311333< / a > < br > < / details > |
2022-05-31 20:26:49 +00:00
| ejs | CVE-2022-29078 | CRITICAL | 2.7.2 | 3.1.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29078" > https://access.redhat.com/security/cve/CVE-2022-29078< / a > < br > < a href = "https://eslam.io/posts/ejs-server-side-template-injection-rce/" > https://eslam.io/posts/ejs-server-side-template-injection-rce/< / a > < br > < a href = "https://github.com/advisories/GHSA-phwq-j96m-2c2q" > https://github.com/advisories/GHSA-phwq-j96m-2c2q< / a > < br > < a href = "https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf" > https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf< / a > < br > < a href = "https://github.com/mde/ejs/releases" > https://github.com/mde/ejs/releases< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29078" > https://nvd.nist.gov/vuln/detail/CVE-2022-29078< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| glob-parent | CVE-2020-28469 | HIGH | 2.0.0 | 5.1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28469" > https://access.redhat.com/security/cve/CVE-2020-28469< / a > < br > < a href = "https://github.com/advisories/GHSA-ww39-953v-wcq6" > https://github.com/advisories/GHSA-ww39-953v-wcq6< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9" > https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/pull/36" > https://github.com/gulpjs/glob-parent/pull/36< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2" > https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-28469.html" > https://linux.oracle.com/cve/CVE-2020-28469.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" > https://nvd.nist.gov/vuln/detail/CVE-2020-28469< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" > https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
| glob-parent | CVE-2020-28469 | HIGH | 5.1.0 | 5.1.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28469" > https://access.redhat.com/security/cve/CVE-2020-28469< / a > < br > < a href = "https://github.com/advisories/GHSA-ww39-953v-wcq6" > https://github.com/advisories/GHSA-ww39-953v-wcq6< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9" > https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/pull/36" > https://github.com/gulpjs/glob-parent/pull/36< / a > < br > < a href = "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2" > https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-28469.html" > https://linux.oracle.com/cve/CVE-2020-28469.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" > https://nvd.nist.gov/vuln/detail/CVE-2020-28469< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" > https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| googleapis | GHSA-7543-mr7h-6v86 | HIGH | 2.1.7 | 39.1.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-7543-mr7h-6v86" > https://github.com/advisories/GHSA-7543-mr7h-6v86< / a > < br > < a href = "https://github.com/googleapis/google-api-nodejs-client/issues/1594" > https://github.com/googleapis/google-api-nodejs-client/issues/1594< / a > < br > < a href = "https://www.npmjs.com/advisories/791" > https://www.npmjs.com/advisories/791< / a > < br > < / details > |
2022-05-24 07:26:11 +00:00
| hawk | CVE-2022-29167 | HIGH | 3.1.3 | 9.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-29167" > https://access.redhat.com/security/cve/CVE-2022-29167< / a > < br > < a href = "https://github.com/advisories/GHSA-44pw-h2cw-w3vq" > https://github.com/advisories/GHSA-44pw-h2cw-w3vq< / a > < br > < a href = "https://github.com/mozilla/hawk/pull/286" > https://github.com/mozilla/hawk/pull/286< / a > < br > < a href = "https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq" > https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-29167" > https://nvd.nist.gov/vuln/detail/CVE-2022-29167< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| highlight.js | CVE-2020-26237 | LOW | 8.9.1 | 10.1.2, 9.18.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-26237" > https://access.redhat.com/security/cve/CVE-2020-26237< / a > < br > < a href = "https://github.com/advisories/GHSA-vfrc-7r7c-w9mx" > https://github.com/advisories/GHSA-vfrc-7r7c-w9mx< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0" > https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/pull/2636" > https://github.com/highlightjs/highlight.js/pull/2636< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx" > https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html" > https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-26237" > https://nvd.nist.gov/vuln/detail/CVE-2020-26237< / a > < br > < a href = "https://www.npmjs.com/package/highlight.js" > https://www.npmjs.com/package/highlight.js< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| highlight.js | GHSA-7wwv-vh3v-89cq | MEDIUM | 9.18.0 | 10.4.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-7wwv-vh3v-89cq" > https://github.com/advisories/GHSA-7wwv-vh3v-89cq< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c" > https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq" > https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq< / a > < br > < a href = "https://www.npmjs.com/package/@highlightjs/cdn-assets" > https://www.npmjs.com/package/@highlightjs/cdn-assets< / a > < br > < a href = "https://www.npmjs.com/package/highlight.js" > https://www.npmjs.com/package/highlight.js< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| highlight.js | CVE-2020-26237 | LOW | 9.18.0 | 10.1.2, 9.18.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-26237" > https://access.redhat.com/security/cve/CVE-2020-26237< / a > < br > < a href = "https://github.com/advisories/GHSA-vfrc-7r7c-w9mx" > https://github.com/advisories/GHSA-vfrc-7r7c-w9mx< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0" > https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/pull/2636" > https://github.com/highlightjs/highlight.js/pull/2636< / a > < br > < a href = "https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx" > https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html" > https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-26237" > https://nvd.nist.gov/vuln/detail/CVE-2020-26237< / a > < br > < a href = "https://www.npmjs.com/package/highlight.js" > https://www.npmjs.com/package/highlight.js< / a > < br > < / details > |
| hoek | CVE-2018-3728 | LOW | 2.16.3 | > =5.0.3 > =4.2.1 | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/103108" > http://www.securityfocus.com/bid/103108< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:1263" > https://access.redhat.com/errata/RHSA-2018:1263< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:1264" > https://access.redhat.com/errata/RHSA-2018:1264< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2018-3728" > https://access.redhat.com/security/cve/CVE-2018-3728< / a > < br > < a href = "https://github.com/advisories/GHSA-jp4x-w63m-7wgm" > https://github.com/advisories/GHSA-jp4x-w63m-7wgm< / a > < br > < a href = "https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee" > https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee< / a > < br > < a href = "https://hackerone.com/reports/310439" > https://hackerone.com/reports/310439< / a > < br > < a href = "https://nodesecurity.io/advisories/566" > https://nodesecurity.io/advisories/566< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-3728" > https://nvd.nist.gov/vuln/detail/CVE-2018-3728< / a > < br > < a href = "https://snyk.io/vuln/npm:hoek:20180212" > https://snyk.io/vuln/npm:hoek:20180212< / a > < br > < a href = "https://www.npmjs.com/advisories/566" > https://www.npmjs.com/advisories/566< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| hosted-git-info | CVE-2021-23362 | MEDIUM | 2.8.5 | 2.8.9, 3.0.8 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23362" > https://access.redhat.com/security/cve/CVE-2021-23362< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3074.html" > https://errata.almalinux.org/8/ALSA-2021-3074.html< / a > < br > < a href = "https://github.com/advisories/GHSA-43f8-2h32-f4cj" > https://github.com/advisories/GHSA-43f8-2h32-f4cj< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7" > https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01" > https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3" > https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3< / a > < br > < a href = "https://github.com/npm/hosted-git-info/commits/v2" > https://github.com/npm/hosted-git-info/commits/v2< / a > < br > < a href = "https://github.com/npm/hosted-git-info/pull/76" > https://github.com/npm/hosted-git-info/pull/76< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-23362.html" > https://linux.oracle.com/cve/CVE-2021-23362.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3074.html" > https://linux.oracle.com/errata/ELSA-2021-3074.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" > https://nvd.nist.gov/vuln/detail/CVE-2021-23362< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355" > https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| ini | CVE-2020-7788 | HIGH | 1.1.0 | 1.3.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7788" > https://access.redhat.com/security/cve/CVE-2020-7788< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788< / a > < br > < a href = "https://github.com/advisories/GHSA-qqgx-2p2h-9c37" > https://github.com/advisories/GHSA-qqgx-2p2h-9c37< / a > < br > < a href = "https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1" > https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1< / a > < br > < a href = "https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)" > https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7788.html" > https://linux.oracle.com/cve/CVE-2020-7788.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html" > https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" > https://nvd.nist.gov/vuln/detail/CVE-2020-7788< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-INI-1048974" > https://snyk.io/vuln/SNYK-JS-INI-1048974< / a > < br > < a href = "https://www.npmjs.com/advisories/1589" > https://www.npmjs.com/advisories/1589< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| jquery | CVE-2020-11022 | MEDIUM | 3.4.1 | 3.5.0 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html< / a > < br > < a href = "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html" > http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-11022" > https://access.redhat.com/security/cve/CVE-2020-11022< / a > < br > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/< / a > < br > < a href = "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" > https://github.com/advisories/GHSA-gxr4-xjj5-5px2< / a > < br > < a href = "https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77" > https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77< / a > < br > < a href = "https://github.com/jquery/jquery/releases/tag/3.5.0" > https://github.com/jquery/jquery/releases/tag/3.5.0< / a > < br > < a href = "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2" > https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2< / a > < br > < a href = "https://jquery.com/upgrade-guide/3.5/" > https://jquery.com/upgrade-guide/3.5/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-11022.html" > https://linux.oracle.com/cve/CVE-2020-11022.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9177.html" > https://linux.oracle.com/errata/ELSA-2022-9177.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E" > https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E" > https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E< / a > < br > < a hr
| jquery | CVE-2020-11023 | MEDIUM | 3.4.1 | 3.5.0 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html" > http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html< / a > < br > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html" > http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html< / a > < br > < a href = "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html" > http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-11023" > https://access.redhat.com/security/cve/CVE-2020-11023< / a > < br > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released< / a > < br > < a href = "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" > https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023< / a > < br > < a href = "https://github.com/advisories/GHSA-jpcq-cgw6-v4j6" > https://github.com/advisories/GHSA-jpcq-cgw6-v4j6< / a > < br > < a href = "https://github.com/jquery/jquery/releases/tag/3.5.0" > https://github.com/jquery/jquery/releases/tag/3.5.0< / a > < br > < a href = "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6" > https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6< / a > < br > < a href = "https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440" > https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440< / a > < br > < a href = "https://jquery.com/upgrade-guide/3.5/" > https://jquery.com/upgrade-guide/3.5/< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-11023.html" > https://linux.oracle.com/cve/CVE-2020-11023.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-9177.html" > https://linux.oracle.com/errata/ELSA-2022-9177.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E" > https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E" > https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E" > https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E" > https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E" > https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E" > https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r4
2022-05-31 20:26:49 +00:00
| json-schema | CVE-2021-3918 | CRITICAL | 0.2.3 | 0.4.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3918" > https://access.redhat.com/security/cve/CVE-2021-3918< / a > < br > < a href = "https://github.com/advisories/GHSA-896r-f27r-55mw" > https://github.com/advisories/GHSA-896r-f27r-55mw< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741" > https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a" > https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a< / a > < br > < a href = "https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa" > https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa< / a > < br > < a href = "https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9" > https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-3918.html" > https://linux.oracle.com/cve/CVE-2021-3918.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2022-0350.html" > https://linux.oracle.com/errata/ELSA-2022-0350.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3918" > https://nvd.nist.gov/vuln/detail/CVE-2021-3918< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| jsonpointer | CVE-2021-23807 | MEDIUM | 4.0.1 | 5.0.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23807" > https://access.redhat.com/security/cve/CVE-2021-23807< / a > < br > < a href = "https://github.com/advisories/GHSA-282f-qqgm-c34q" > https://github.com/advisories/GHSA-282f-qqgm-c34q< / a > < br > < a href = "https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4" > https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4< / a > < br > < a href = "https://github.com/janl/node-jsonpointer/pull/51" > https://github.com/janl/node-jsonpointer/pull/51< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23807" > https://nvd.nist.gov/vuln/detail/CVE-2021-23807< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288" > https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288< / a > < br > < / details > |
| kind-of | CVE-2019-20149 | HIGH | 6.0.2 | 6.0.3 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-20149" > https://access.redhat.com/security/cve/CVE-2019-20149< / a > < br > < a href = "https://github.com/advisories/GHSA-6c8f-qphg-qjgp" > https://github.com/advisories/GHSA-6c8f-qphg-qjgp< / a > < br > < a href = "https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b" > https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b< / a > < br > < a href = "https://github.com/jonschlinkert/kind-of/issues/30" > https://github.com/jonschlinkert/kind-of/issues/30< / a > < br > < a href = "https://github.com/jonschlinkert/kind-of/pull/31" > https://github.com/jonschlinkert/kind-of/pull/31< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-20149" > https://nvd.nist.gov/vuln/detail/CVE-2019-20149< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-KINDOF-537849" > https://snyk.io/vuln/SNYK-JS-KINDOF-537849< / a > < br > < a href = "https://www.npmjs.com/advisories/1490" > https://www.npmjs.com/advisories/1490< / a > < br > < / details > |
| lodash | CVE-2019-10744 | CRITICAL | 3.10.1 | 4.17.12 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3024" > https://access.redhat.com/errata/RHSA-2019:3024< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-10744" > https://access.redhat.com/security/cve/CVE-2019-10744< / a > < br > < a href = "https://github.com/advisories/GHSA-jf85-cpcp-j695" > https://github.com/advisories/GHSA-jf85-cpcp-j695< / a > < br > < a href = "https://github.com/lodash/lodash/pull/4336" > https://github.com/lodash/lodash/pull/4336< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-10744" > https://nvd.nist.gov/vuln/detail/CVE-2019-10744< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20191004-0005/" > https://security.netapp.com/advisory/ntap-20191004-0005/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-450202" > https://snyk.io/vuln/SNYK-JS-LODASH-450202< / a > < br > < a href = "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K47105354?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://www.npmjs.com/advisories/1065" > https://www.npmjs.com/advisories/1065< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < / details > |
| lodash | CVE-2018-16487 | HIGH | 3.10.1 | > =4.17.11 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-16487" > https://access.redhat.com/security/cve/CVE-2018-16487< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16487" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16487< / a > < br > < a href = "https://github.com/advisories/GHSA-4xc9-xhrj-v574" > https://github.com/advisories/GHSA-4xc9-xhrj-v574< / a > < br > < a href = "https://hackerone.com/reports/380873" > https://hackerone.com/reports/380873< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-16487" > https://nvd.nist.gov/vuln/detail/CVE-2018-16487< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190919-0004/" > https://security.netapp.com/advisory/ntap-20190919-0004/< / a > < br > < a href = "https://www.npmjs.com/advisories/782" > https://www.npmjs.com/advisories/782< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| lodash | CVE-2020-8203 | HIGH | 3.10.1 | 4.17.20 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-8203" > https://access.redhat.com/security/cve/CVE-2020-8203< / a > < br > < a href = "https://github.com/advisories/GHSA-p6mc-m468-83gw" > https://github.com/advisories/GHSA-p6mc-m468-83gw< / a > < br > < a href = "https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12" > https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12< / a > < br > < a href = "https://github.com/lodash/lodash/issues/4744" > https://github.com/lodash/lodash/issues/4744< / a > < br > < a href = "https://github.com/lodash/lodash/issues/4874" > https://github.com/lodash/lodash/issues/4874< / a > < br > < a href = "https://hackerone.com/reports/712065" > https://hackerone.com/reports/712065< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-8203" > https://nvd.nist.gov/vuln/detail/CVE-2020-8203< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200724-0006/" > https://security.netapp.com/advisory/ntap-20200724-0006/< / a > < br > < a href = "https://www.npmjs.com/advisories/1523" > https://www.npmjs.com/advisories/1523< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| lodash | CVE-2021-23337 | HIGH | 3.10.1 | 4.17.21 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23337" > https://access.redhat.com/security/cve/CVE-2021-23337< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337< / a > < br > < a href = "https://github.com/advisories/GHSA-35jh-r3h4-6jhm" > https://github.com/advisories/GHSA-35jh-r3h4-6jhm< / a > < br > < a href = "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851" > https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851< / a > < br > < a href = "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851" > https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851< / a > < br > < a href = "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c" > https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23337" > https://nvd.nist.gov/vuln/detail/CVE-2021-23337< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210312-0006/" > https://security.netapp.com/advisory/ntap-20210312-0006/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932" > https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-1040724" > https://snyk.io/vuln/SNYK-JS-LODASH-1040724< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| lodash | CVE-2019-1010266 | MEDIUM | 3.10.1 | 4.17.11 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2019-1010266" > https://access.redhat.com/security/cve/CVE-2019-1010266< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010266< / a > < br > < a href = "https://github.com/advisories/GHSA-x5rq-j2xg-h7qm" > https://github.com/advisories/GHSA-x5rq-j2xg-h7qm< / a > < br > < a href = "https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347" > https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347< / a > < br > < a href = "https://github.com/lodash/lodash/issues/3359" > https://github.com/lodash/lodash/issues/3359< / a > < br > < a href = "https://github.com/lodash/lodash/wiki/Changelog" > https://github.com/lodash/lodash/wiki/Changelog< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-1010266" > https://nvd.nist.gov/vuln/detail/CVE-2019-1010266< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190919-0004/" > https://security.netapp.com/advisory/ntap-20190919-0004/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-73639" > https://snyk.io/vuln/SNYK-JS-LODASH-73639< / a > < br > < / details > |
| lodash | CVE-2020-28500 | MEDIUM | 3.10.1 | 4.17.21 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28500" > https://access.redhat.com/security/cve/CVE-2020-28500< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500< / a > < br > < a href = "https://github.com/advisories/GHSA-29mw-wpgm-hmr9" > https://github.com/advisories/GHSA-29mw-wpgm-hmr9< / a > < br > < a href = "https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8" > https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8< / a > < br > < a href = "https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8" > https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8< / a > < br > < a href = "https://github.com/lodash/lodash/pull/5065" > https://github.com/lodash/lodash/pull/5065< / a > < br > < a href = "https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7" > https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28500" > https://nvd.nist.gov/vuln/detail/CVE-2020-28500< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210312-0006/" > https://security.netapp.com/advisory/ntap-20210312-0006/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896" > https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-1018905" > https://snyk.io/vuln/SNYK-JS-LODASH-1018905< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| lodash | CVE-2018-3721 | LOW | 3.10.1 | > =4.17.5 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2018-3721" > https://access.redhat.com/security/cve/CVE-2018-3721< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3721" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3721< / a > < br > < a href = "https://github.com/advisories/GHSA-fvqr-27wr-82fm" > https://github.com/advisories/GHSA-fvqr-27wr-82fm< / a > < br > < a href = "https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a" > https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a< / a > < br > < a href = "https://hackerone.com/reports/310443" > https://hackerone.com/reports/310443< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2018-3721" > https://nvd.nist.gov/vuln/detail/CVE-2018-3721< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20190919-0004/" > https://security.netapp.com/advisory/ntap-20190919-0004/< / a > < br > < a href = "https://snyk.io/vuln/npm:lodash:20180130" > https://snyk.io/vuln/npm:lodash:20180130< / a > < br > < a href = "https://www.npmjs.com/advisories/577" > https://www.npmjs.com/advisories/577< / a > < br > < / details > |
2022-04-20 21:21:59 +00:00
| lodash | CVE-2020-8203 | HIGH | 4.17.15 | 4.17.20 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-8203" > https://access.redhat.com/security/cve/CVE-2020-8203< / a > < br > < a href = "https://github.com/advisories/GHSA-p6mc-m468-83gw" > https://github.com/advisories/GHSA-p6mc-m468-83gw< / a > < br > < a href = "https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12" > https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12< / a > < br > < a href = "https://github.com/lodash/lodash/issues/4744" > https://github.com/lodash/lodash/issues/4744< / a > < br > < a href = "https://github.com/lodash/lodash/issues/4874" > https://github.com/lodash/lodash/issues/4874< / a > < br > < a href = "https://hackerone.com/reports/712065" > https://hackerone.com/reports/712065< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-8203" > https://nvd.nist.gov/vuln/detail/CVE-2020-8203< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20200724-0006/" > https://security.netapp.com/advisory/ntap-20200724-0006/< / a > < br > < a href = "https://www.npmjs.com/advisories/1523" > https://www.npmjs.com/advisories/1523< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuapr2022.html" > https://www.oracle.com/security-alerts/cpuapr2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| lodash | CVE-2021-23337 | HIGH | 4.17.15 | 4.17.21 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23337" > https://access.redhat.com/security/cve/CVE-2021-23337< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337< / a > < br > < a href = "https://github.com/advisories/GHSA-35jh-r3h4-6jhm" > https://github.com/advisories/GHSA-35jh-r3h4-6jhm< / a > < br > < a href = "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851" > https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851< / a > < br > < a href = "https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851" > https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851< / a > < br > < a href = "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c" > https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23337" > https://nvd.nist.gov/vuln/detail/CVE-2021-23337< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210312-0006/" > https://security.netapp.com/advisory/ntap-20210312-0006/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932" > https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-1040724" > https://snyk.io/vuln/SNYK-JS-LODASH-1040724< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| lodash | NSWG-ECO-516 | HIGH | 4.17.15 | > =4.17.19 | < details > < summary > Expand...< / summary > < a href = "https://github.com/lodash/lodash/pull/4759" > https://github.com/lodash/lodash/pull/4759< / a > < br > < a href = "https://hackerone.com/reports/712065" > https://hackerone.com/reports/712065< / a > < br > < a href = "https://www.npmjs.com/advisories/1523" > https://www.npmjs.com/advisories/1523< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| lodash | CVE-2020-28500 | MEDIUM | 4.17.15 | 4.17.21 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-28500" > https://access.redhat.com/security/cve/CVE-2020-28500< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500< / a > < br > < a href = "https://github.com/advisories/GHSA-29mw-wpgm-hmr9" > https://github.com/advisories/GHSA-29mw-wpgm-hmr9< / a > < br > < a href = "https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8" > https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8< / a > < br > < a href = "https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8" > https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8< / a > < br > < a href = "https://github.com/lodash/lodash/pull/5065" > https://github.com/lodash/lodash/pull/5065< / a > < br > < a href = "https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7" > https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-28500" > https://nvd.nist.gov/vuln/detail/CVE-2020-28500< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210312-0006/" > https://security.netapp.com/advisory/ntap-20210312-0006/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896" > https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-1018905" > https://snyk.io/vuln/SNYK-JS-LODASH-1018905< / a > < br > < a href = "https://www.oracle.com//security-alerts/cpujul2021.html" > https://www.oracle.com//security-alerts/cpujul2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2022.html" > https://www.oracle.com/security-alerts/cpujan2022.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2021.html" > https://www.oracle.com/security-alerts/cpuoct2021.html< / a > < br > < / details > |
| lodash.template | CVE-2019-10744 | CRITICAL | 3.6.2 | 4.5.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2019:3024" > https://access.redhat.com/errata/RHSA-2019:3024< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2019-10744" > https://access.redhat.com/security/cve/CVE-2019-10744< / a > < br > < a href = "https://github.com/advisories/GHSA-jf85-cpcp-j695" > https://github.com/advisories/GHSA-jf85-cpcp-j695< / a > < br > < a href = "https://github.com/lodash/lodash/pull/4336" > https://github.com/lodash/lodash/pull/4336< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2019-10744" > https://nvd.nist.gov/vuln/detail/CVE-2019-10744< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20191004-0005/" > https://security.netapp.com/advisory/ntap-20191004-0005/< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-LODASH-450202" > https://snyk.io/vuln/SNYK-JS-LODASH-450202< / a > < br > < a href = "https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS" > https://support.f5.com/csp/article/K47105354?utm_source=f5support& amp;utm_medium=RSS< / a > < br > < a href = "https://www.npmjs.com/advisories/1065" > https://www.npmjs.com/advisories/1065< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpujan2021.html" > https://www.oracle.com/security-alerts/cpujan2021.html< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuoct2020.html" > https://www.oracle.com/security-alerts/cpuoct2020.html< / a > < br > < / details > |
2022-01-13 17:23:23 +00:00
| markdown-it | CVE-2022-21670 | MEDIUM | 4.4.0 | 12.3.2 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-6vfc-qv3f-vr6c" > https://github.com/advisories/GHSA-6vfc-qv3f-vr6c< / a > < br > < a href = "https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101" > https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101< / a > < br > < a href = "https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c" > https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21670" > https://nvd.nist.gov/vuln/detail/CVE-2022-21670< / a > < br > < / details > |
2022-05-10 21:17:41 +00:00
| marked | CVE-2022-21680 | HIGH | 0.8.0 | 4.0.10 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-21680" > https://access.redhat.com/security/cve/CVE-2022-21680< / a > < br > < a href = "https://github.com/advisories/GHSA-rrrm-qjm4-v8hf" > https://github.com/advisories/GHSA-rrrm-qjm4-v8hf< / a > < br > < a href = "https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0" > https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0< / a > < br > < a href = "https://github.com/markedjs/marked/releases/tag/v4.0.10" > https://github.com/markedjs/marked/releases/tag/v4.0.10< / a > < br > < a href = "https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf" > https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21680" > https://nvd.nist.gov/vuln/detail/CVE-2022-21680< / a > < br > < / details > |
| marked | CVE-2022-21681 | HIGH | 0.8.0 | 4.0.10 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-21681" > https://access.redhat.com/security/cve/CVE-2022-21681< / a > < br > < a href = "https://github.com/advisories/GHSA-5v2h-r2cx-5xgj" > https://github.com/advisories/GHSA-5v2h-r2cx-5xgj< / a > < br > < a href = "https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5" > https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5< / a > < br > < a href = "https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj" > https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-21681" > https://nvd.nist.gov/vuln/detail/CVE-2022-21681< / a > < br > < / details > |
2021-12-18 20:15:26 +00:00
| md-to-pdf | CVE-2021-23639 | CRITICAL | 3.0.0 | 5.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-x949-7cm6-fm6p" > https://github.com/advisories/GHSA-x949-7cm6-fm6p< / a > < br > < a href = "https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a" > https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a< / a > < br > < a href = "https://github.com/simonhaenisch/md-to-pdf/issues/99" > https://github.com/simonhaenisch/md-to-pdf/issues/99< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23639" > https://nvd.nist.gov/vuln/detail/CVE-2021-23639< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880" > https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| mime | CVE-2017-16138 | MEDIUM | 1.3.4 | 2.0.3, 1.4.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2017-16138" > https://access.redhat.com/security/cve/CVE-2017-16138< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138< / a > < br > < a href = "https://github.com/advisories/GHSA-wrvr-8mpx-r7pp" > https://github.com/advisories/GHSA-wrvr-8mpx-r7pp< / a > < br > < a href = "https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0 (2.x)" > https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0 (2.x)< / a > < br > < a href = "https://github.com/broofa/node-mime/commit/855d0c4b8b22e4a80b9401a81f2872058eae274d (1.x)" > https://github.com/broofa/node-mime/commit/855d0c4b8b22e4a80b9401a81f2872058eae274d (1.x)< / a > < br > < a href = "https://github.com/broofa/node-mime/issues/167" > https://github.com/broofa/node-mime/issues/167< / a > < br > < a href = "https://nodesecurity.io/advisories/535" > https://nodesecurity.io/advisories/535< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2017-16138" > https://nvd.nist.gov/vuln/detail/CVE-2017-16138< / a > < br > < a href = "https://www.npmjs.com/advisories/535" > https://www.npmjs.com/advisories/535< / a > < br > < / details > |
2022-04-26 20:05:48 +00:00
| minimatch | CVE-2016-10540 | HIGH | 2.0.10 | 3.0.2 | < details > < summary > Expand...< / summary > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10540" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10540< / a > < br > < a href = "https://github.com/advisories/GHSA-hxm2-r34f-qmc5" > https://github.com/advisories/GHSA-hxm2-r34f-qmc5< / a > < br > < a href = "https://nodesecurity.io/advisories/118" > https://nodesecurity.io/advisories/118< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-10540" > https://nvd.nist.gov/vuln/detail/CVE-2016-10540< / a > < br > < a href = "https://www.npmjs.com/advisories/118" > https://www.npmjs.com/advisories/118< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| minimatch | NSWG-ECO-118 | HIGH | 2.0.10 | > =3.0.2 | < details > < summary > Expand...< / summary > < a href = "https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS" > https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| minimist | CVE-2021-44906 | CRITICAL | 0.0.8 | 1.2.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44906" > https://access.redhat.com/security/cve/CVE-2021-44906< / a > < br > < a href = "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" > https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip< / a > < br > < a href = "https://github.com/advisories/GHSA-xvch-5gv4-984h" > https://github.com/advisories/GHSA-xvch-5gv4-984h< / a > < br > < a href = "https://github.com/substack/minimist/blob/master/index.js#L69" > https://github.com/substack/minimist/blob/master/index.js#L69< / a > < br > < a href = "https://github.com/substack/minimist/issues/164" > https://github.com/substack/minimist/issues/164< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" > https://nvd.nist.gov/vuln/detail/CVE-2021-44906< / a > < br > < a href = "https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" > https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| minimist | CVE-2020-7598 | MEDIUM | 0.0.8 | 1.2.3, 0.2.1 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" > http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-7598" > https://access.redhat.com/security/cve/CVE-2020-7598< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2020-2852.html" > https://errata.almalinux.org/8/ALSA-2020-2852.html< / a > < br > < a href = "https://github.com/advisories/GHSA-vh95-rmgr-6w4m" > https://github.com/advisories/GHSA-vh95-rmgr-6w4m< / a > < br > < a href = "https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab" > https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab< / a > < br > < a href = "https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95" > https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95< / a > < br > < a href = "https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94" > https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7598.html" > https://linux.oracle.com/cve/CVE-2020-7598.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-2852.html" > https://linux.oracle.com/errata/ELSA-2020-2852.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" > https://nvd.nist.gov/vuln/detail/CVE-2020-7598< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://www.npmjs.com/advisories/1179" > https://www.npmjs.com/advisories/1179< / a > < br > < / details > |
2022-05-18 20:10:07 +00:00
| minimist | CVE-2021-44906 | CRITICAL | 1.2.0 | 1.2.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-44906" > https://access.redhat.com/security/cve/CVE-2021-44906< / a > < br > < a href = "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip" > https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip< / a > < br > < a href = "https://github.com/advisories/GHSA-xvch-5gv4-984h" > https://github.com/advisories/GHSA-xvch-5gv4-984h< / a > < br > < a href = "https://github.com/substack/minimist/blob/master/index.js#L69" > https://github.com/substack/minimist/blob/master/index.js#L69< / a > < br > < a href = "https://github.com/substack/minimist/issues/164" > https://github.com/substack/minimist/issues/164< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-44906" > https://nvd.nist.gov/vuln/detail/CVE-2021-44906< / a > < br > < a href = "https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068" > https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| minimist | CVE-2020-7598 | MEDIUM | 1.2.0 | 1.2.3, 0.2.1 | < details > < summary > Expand...< / summary > < a href = "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" > http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2020-7598" > https://access.redhat.com/security/cve/CVE-2020-7598< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2020-2852.html" > https://errata.almalinux.org/8/ALSA-2020-2852.html< / a > < br > < a href = "https://github.com/advisories/GHSA-vh95-rmgr-6w4m" > https://github.com/advisories/GHSA-vh95-rmgr-6w4m< / a > < br > < a href = "https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab" > https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab< / a > < br > < a href = "https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95" > https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95< / a > < br > < a href = "https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94" > https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7598.html" > https://linux.oracle.com/cve/CVE-2020-7598.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2020-2852.html" > https://linux.oracle.com/errata/ELSA-2020-2852.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" > https://nvd.nist.gov/vuln/detail/CVE-2020-7598< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" > https://snyk.io/vuln/SNYK-JS-MINIMIST-559764< / a > < br > < a href = "https://www.npmjs.com/advisories/1179" > https://www.npmjs.com/advisories/1179< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| node-fetch | CVE-2022-0235 | HIGH | 1.7.3 | 2.6.7, 3.1.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-0235" > https://access.redhat.com/security/cve/CVE-2022-0235< / a > < br > < a href = "https://github.com/advisories/GHSA-r683-j2x4-v87g" > https://github.com/advisories/GHSA-r683-j2x4-v87g< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10" > https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60" > https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/pull/1453" > https://github.com/node-fetch/node-fetch/pull/1453< / a > < br > < a href = "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7" > https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7< / a > < br > < a href = "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" > https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" > https://nvd.nist.gov/vuln/detail/CVE-2022-0235< / a > < br > < / details > |
| node-fetch | CVE-2020-15168 | LOW | 1.7.3 | 3.0.0-beta.9, 2.6.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-15168" > https://access.redhat.com/security/cve/CVE-2020-15168< / a > < br > < a href = "https://github.com/advisories/GHSA-w7rc-rwvf-8q5r" > https://github.com/advisories/GHSA-w7rc-rwvf-8q5r< / a > < br > < a href = "https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r" > https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-15168" > https://nvd.nist.gov/vuln/detail/CVE-2020-15168< / a > < br > < a href = "https://www.npmjs.com/package/node-fetch" > https://www.npmjs.com/package/node-fetch< / a > < br > < / details > |
| node-forge | CVE-2020-7720 | HIGH | 0.7.6 | 0.10.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7720" > https://access.redhat.com/security/cve/CVE-2020-7720< / a > < br > < a href = "https://github.com/advisories/GHSA-92xj-mqp7-vmcj" > https://github.com/advisories/GHSA-92xj-mqp7-vmcj< / a > < br > < a href = "https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md" > https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md< / a > < br > < a href = "https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed" > https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7720" > https://nvd.nist.gov/vuln/detail/CVE-2020-7720< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677" > https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677< / a > < br > < / details > |
| node-forge | CVE-2022-24771 | HIGH | 0.7.6 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24771" > https://access.redhat.com/security/cve/CVE-2022-24771< / a > < br > < a href = "https://github.com/advisories/GHSA-cfm4-qjh2-4765" > https://github.com/advisories/GHSA-cfm4-qjh2-4765< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" > https://nvd.nist.gov/vuln/detail/CVE-2022-24771< / a > < br > < / details > |
| node-forge | CVE-2022-24772 | HIGH | 0.7.6 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24772" > https://access.redhat.com/security/cve/CVE-2022-24772< / a > < br > < a href = "https://github.com/advisories/GHSA-x4jg-mjrx-434g" > https://github.com/advisories/GHSA-x4jg-mjrx-434g< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" > https://nvd.nist.gov/vuln/detail/CVE-2022-24772< / a > < br > < / details > |
2022-01-22 14:28:47 +00:00
| node-forge | CVE-2022-0122 | MEDIUM | 0.7.6 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-8fr3-hfg3-gpgp" > https://github.com/advisories/GHSA-8fr3-hfg3-gpgp< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e" > https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e< / a > < br > < a href = "https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae" > https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-0122" > https://nvd.nist.gov/vuln/detail/CVE-2022-0122< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| node-forge | CVE-2022-24773 | MEDIUM | 0.7.6 | 1.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2022-24773" > https://access.redhat.com/security/cve/CVE-2022-24773< / a > < br > < a href = "https://github.com/advisories/GHSA-2r2c-g63r-vccr" > https://github.com/advisories/GHSA-2r2c-g63r-vccr< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1" > https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1< / a > < br > < a href = "https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2" > https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2022-24773" > https://nvd.nist.gov/vuln/detail/CVE-2022-24773< / a > < br > < / details > |
2022-01-11 18:34:38 +00:00
| node-forge | GHSA-5rrq-pxf6-6jx5 | LOW | 0.7.6 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-5rrq-pxf6-6jx5" > https://github.com/advisories/GHSA-5rrq-pxf6-6jx5< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5< / a > < br > < / details > |
| node-forge | GHSA-gf8q-jrpm-jvxq | LOW | 0.7.6 | 1.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-gf8q-jrpm-jvxq" > https://github.com/advisories/GHSA-gf8q-jrpm-jvxq< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq< / a > < br > < / details > |
| node-forge | GHSA-wxgw-qj99-44c2 | LOW | 0.7.6 | 0.10.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-wxgw-qj99-44c2" > https://github.com/advisories/GHSA-wxgw-qj99-44c2< / a > < br > < a href = "https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2" > https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2< / a > < br > < / details > |
2022-05-31 20:26:49 +00:00
| nth-check | CVE-2021-3803 | HIGH | 1.0.2 | 2.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-3803" > https://access.redhat.com/security/cve/CVE-2021-3803< / a > < br > < a href = "https://github.com/advisories/GHSA-rp65-9cf3-cjxr" > https://github.com/advisories/GHSA-rp65-9cf3-cjxr< / a > < br > < a href = "https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726" > https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726< / a > < br > < a href = "https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0" > https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-3803" > https://nvd.nist.gov/vuln/detail/CVE-2021-3803< / a > < br > < / details > |
2022-01-11 18:34:38 +00:00
| parse-link-header | CVE-2021-23490 | HIGH | 0.4.1 | 2.0.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-q674-xm3x-2926" > https://github.com/advisories/GHSA-q674-xm3x-2926< / a > < br > < a href = "https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1" > https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23490" > https://nvd.nist.gov/vuln/detail/CVE-2021-23490< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783" > https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783< / a > < br > < / details > |
2022-05-24 07:26:11 +00:00
| path-parse | CVE-2021-23343 | MEDIUM | 1.0.6 | 1.0.7 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json< / a > < br > < a href = "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json" > https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2021-23343" > https://access.redhat.com/security/cve/CVE-2021-23343< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-3666.html" > https://errata.almalinux.org/8/ALSA-2021-3666.html< / a > < br > < a href = "https://github.com/advisories/GHSA-hj48-42vr-x3v9" > https://github.com/advisories/GHSA-hj48-42vr-x3v9< / a > < br > < a href = "https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7" > https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7< / a > < br > < a href = "https://github.com/jbgutierrez/path-parse/issues/8" > https://github.com/jbgutierrez/path-parse/issues/8< / a > < br > < a href = "https://github.com/jbgutierrez/path-parse/pull/10" > https://github.com/jbgutierrez/path-parse/pull/10< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2021-23343.html" > https://linux.oracle.com/cve/CVE-2021-23343.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-3666.html" > https://linux.oracle.com/errata/ELSA-2021-3666.html< / a > < br > < a href = "https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E" > https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" > https://nvd.nist.gov/vuln/detail/CVE-2021-23343< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" > https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| postcss | CVE-2021-23382 | MEDIUM | 5.0.21 | 7.0.36, 8.2.13 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23382" > https://access.redhat.com/security/cve/CVE-2021-23382< / a > < br > < a href = "https://github.com/advisories/GHSA-566m-qj78-rww5" > https://github.com/advisories/GHSA-566m-qj78-rww5< / a > < br > < a href = "https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956" > https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956< / a > < br > < a href = "https://github.com/postcss/postcss/releases/tag/7.0.36" > https://github.com/postcss/postcss/releases/tag/7.0.36< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23382" > https://nvd.nist.gov/vuln/detail/CVE-2021-23382< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640" > https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640< / a > < br > < / details > |
| qs | CVE-2017-1000048 | HIGH | 5.2.1 | 6.3.2, 6.2.3, 6.1.2, 6.0.4 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2017:2672" > https://access.redhat.com/errata/RHSA-2017:2672< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-1000048" > https://access.redhat.com/security/cve/CVE-2017-1000048< / a > < br > < a href = "https://github.com/advisories/GHSA-gqgv-6jq5-jjj9" > https://github.com/advisories/GHSA-gqgv-6jq5-jjj9< / a > < br > < a href = "https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d" > https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d< / a > < br > < a href = "https://github.com/ljharb/qs/issues/200" > https://github.com/ljharb/qs/issues/200< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2017-1000048" > https://nvd.nist.gov/vuln/detail/CVE-2017-1000048< / a > < br > < a href = "https://snyk.io/vuln/npm:qs:20170213" > https://snyk.io/vuln/npm:qs:20170213< / a > < br > < a href = "https://www.npmjs.com/advisories/1469" > https://www.npmjs.com/advisories/1469< / a > < br > < / details > |
| request | CVE-2017-16026 | MEDIUM | 2.65.0 | 2.68.0, 2.68.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2017-16026" > https://access.redhat.com/security/cve/CVE-2017-16026< / a > < br > < a href = "https://github.com/advisories/GHSA-7xfp-9c55-5vqj" > https://github.com/advisories/GHSA-7xfp-9c55-5vqj< / a > < br > < a href = "https://github.com/request/request/issues/1904" > https://github.com/request/request/issues/1904< / a > < br > < a href = "https://github.com/request/request/pull/2018" > https://github.com/request/request/pull/2018< / a > < br > < a href = "https://nodesecurity.io/advisories/309" > https://nodesecurity.io/advisories/309< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2017-16026" > https://nvd.nist.gov/vuln/detail/CVE-2017-16026< / a > < br > < a href = "https://www.npmjs.com/advisories/309" > https://www.npmjs.com/advisories/309< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| request | NSWG-ECO-309 | MEDIUM | 2.65.0 | > =2.68.0 | < details > < summary > Expand...< / summary > < a href = "https://github.com/request/request/issues/1904" > https://github.com/request/request/issues/1904< / a > < br > < a href = "https://github.com/request/request/pull/2018" > https://github.com/request/request/pull/2018< / a > < br > < / details > |
| set-getter | CVE-2021-25949 | CRITICAL | 0.1.0 | 0.1.1 | < details > < summary > Expand...< / summary > < a href = "https://github.com/advisories/GHSA-jv35-xqg7-f92r" > https://github.com/advisories/GHSA-jv35-xqg7-f92r< / a > < br > < a href = "https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56" > https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56< / a > < br > < a href = "https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4" > https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-25949" > https://nvd.nist.gov/vuln/detail/CVE-2021-25949< / a > < br > < a href = "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949" > https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| tough-cookie | CVE-2016-1000232 | HIGH | 2.2.2 | > =2.3.0 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/errata/RHSA-2016:2101" > https://access.redhat.com/errata/RHSA-2016:2101< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2017:2912" > https://access.redhat.com/errata/RHSA-2017:2912< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2016-1000232" > https://access.redhat.com/security/cve/CVE-2016-1000232< / a > < br > < a href = "https://access.redhat.com/security/cve/cve-2016-1000232" > https://access.redhat.com/security/cve/cve-2016-1000232< / a > < br > < a href = "https://github.com/advisories/GHSA-qhv9-728r-6jqg" > https://github.com/advisories/GHSA-qhv9-728r-6jqg< / a > < br > < a href = "https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae" > https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae< / a > < br > < a href = "https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534" > https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534< / a > < br > < a href = "https://nodesecurity.io/advisories/130" > https://nodesecurity.io/advisories/130< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2016-1000232" > https://nvd.nist.gov/vuln/detail/CVE-2016-1000232< / a > < br > < a href = "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/" > https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/< / a > < br > < a href = "https://www.npmjs.com/advisories/130" > https://www.npmjs.com/advisories/130< / a > < br > < / details > |
| tough-cookie | CVE-2017-15010 | HIGH | 2.2.2 | 2.3.3 | < details > < summary > Expand...< / summary > < a href = "http://www.securityfocus.com/bid/101185" > http://www.securityfocus.com/bid/101185< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2017:2912" > https://access.redhat.com/errata/RHSA-2017:2912< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2017:2913" > https://access.redhat.com/errata/RHSA-2017:2913< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:1263" > https://access.redhat.com/errata/RHSA-2018:1263< / a > < br > < a href = "https://access.redhat.com/errata/RHSA-2018:1264" > https://access.redhat.com/errata/RHSA-2018:1264< / a > < br > < a href = "https://access.redhat.com/security/cve/CVE-2017-15010" > https://access.redhat.com/security/cve/CVE-2017-15010< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15010" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15010< / a > < br > < a href = "https://github.com/advisories/GHSA-g7q5-pjjr-gqvp" > https://github.com/advisories/GHSA-g7q5-pjjr-gqvp< / a > < br > < a href = "https://github.com/salesforce/tough-cookie/issues/92" > https://github.com/salesforce/tough-cookie/issues/92< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/< / a > < br > < a href = "https://nodesecurity.io/advisories/525" > https://nodesecurity.io/advisories/525< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2017-15010" > https://nvd.nist.gov/vuln/detail/CVE-2017-15010< / a > < br > < a href = "https://snyk.io/vuln/npm:tough-cookie:20170905" > https://snyk.io/vuln/npm:tough-cookie:20170905< / a > < br > < a href = "https://www.npmjs.com/advisories/525" > https://www.npmjs.com/advisories/525< / a > < br > < / details > |
2021-12-12 22:42:29 +00:00
| tunnel-agent | GHSA-xc7v-wxcw-j472 | MEDIUM | 0.4.3 | 0.6.0 | < details > < summary > Expand...< / summary > < a href = "https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4" > https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4< / a > < br > < a href = "https://github.com/advisories/GHSA-xc7v-wxcw-j472" > https://github.com/advisories/GHSA-xc7v-wxcw-j472< / a > < br > < a href = "https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0" > https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0< / a > < br > < a href = "https://www.npmjs.com/advisories/598" > https://www.npmjs.com/advisories/598< / a > < br > < / details > |
| tunnel-agent | NSWG-ECO-393 | MEDIUM | 0.4.3 | > =0.6.0 | < details > < summary > Expand...< / summary > < a href = "https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4" > https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4< / a > < br > < a href = "https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0" > https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0< / a > < br > < / details > |
2022-03-30 20:23:21 +00:00
| underscore | CVE-2021-23358 | HIGH | 1.9.1 | 1.12.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-23358" > https://access.redhat.com/security/cve/CVE-2021-23358< / a > < br > < a href = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358" > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358< / a > < br > < a href = "https://github.com/advisories/GHSA-cf4h-3jhx-xvhq" > https://github.com/advisories/GHSA-cf4h-3jhx-xvhq< / a > < br > < a href = "https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71" > https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71< / a > < br > < a href = "https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66" > https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66< / a > < br > < a href = "https://github.com/jashkenas/underscore/pull/2917" > https://github.com/jashkenas/underscore/pull/2917< / a > < br > < a href = "https://github.com/jashkenas/underscore/releases/tag/1.12.1" > https://github.com/jashkenas/underscore/releases/tag/1.12.1< / a > < br > < a href = "https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E" > https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E" > https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E" > https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E" > https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E< / a > < br > < a href = "https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E" > https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E< / a > < br > < a href = "https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html" > https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/< / a > < br > < a href = "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/" > https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-23358" > https://nvd.nist.gov/vuln/detail/CVE-2021-23358< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984" > https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4913-1" > https://ubuntu.com/security/notices/USN-4913-1< / a > < br > < a href = "https://ubuntu.com/security/notices/USN-4913-2" > https://ubuntu.com/security/notices/USN-4913-2< / a > < br > < a href = "https://www.debian.org/security/2021/dsa-4883" > https://www.deb
2022-06-07 18:33:12 +00:00
| ws | CVE-2021-32640 | MEDIUM | 6.1.4 | 5.2.3, 6.2.2, 7.4.6 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2021-32640" > https://access.redhat.com/security/cve/CVE-2021-32640< / a > < br > < a href = "https://github.com/advisories/GHSA-6fc8-4gx4-v693" > https://github.com/advisories/GHSA-6fc8-4gx4-v693< / a > < br > < a href = "https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff" > https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff< / a > < br > < a href = "https://github.com/websockets/ws/issues/1895" > https://github.com/websockets/ws/issues/1895< / a > < br > < a href = "https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693" > https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693< / a > < br > < a href = "https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E" > https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2021-32640" > https://nvd.nist.gov/vuln/detail/CVE-2021-32640< / a > < br > < a href = "https://security.netapp.com/advisory/ntap-20210706-0005/" > https://security.netapp.com/advisory/ntap-20210706-0005/< / a > < br > < / details > |
2022-05-17 08:50:16 +00:00
| y18n | CVE-2020-7774 | HIGH | 3.2.1 | 5.0.5, 4.0.1, 3.2.2 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7774" > https://access.redhat.com/security/cve/CVE-2020-7774< / a > < br > < a href = "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" > https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0551.html" > https://errata.almalinux.org/8/ALSA-2021-0551.html< / a > < br > < a href = "https://github.com/advisories/GHSA-c4w7-xm78-47vh" > https://github.com/advisories/GHSA-c4w7-xm78-47vh< / a > < br > < a href = "https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25" > https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25< / a > < br > < a href = "https://github.com/yargs/y18n/issues/96" > https://github.com/yargs/y18n/issues/96< / a > < br > < a href = "https://github.com/yargs/y18n/pull/108" > https://github.com/yargs/y18n/pull/108< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7774.html" > https://linux.oracle.com/cve/CVE-2020-7774.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0551.html" > https://linux.oracle.com/errata/ELSA-2021-0551.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" > https://nvd.nist.gov/vuln/detail/CVE-2020-7774< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306" > https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" > https://snyk.io/vuln/SNYK-JS-Y18N-1021887< / a > < br > < a href = "https://www.oracle.com/security-alerts/cpuApr2021.html" > https://www.oracle.com/security-alerts/cpuApr2021.html< / a > < br > < / details > |
| yargs-parser | CVE-2020-7608 | MEDIUM | 4.2.1 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 | < details > < summary > Expand...< / summary > < a href = "https://access.redhat.com/security/cve/CVE-2020-7608" > https://access.redhat.com/security/cve/CVE-2020-7608< / a > < br > < a href = "https://errata.almalinux.org/8/ALSA-2021-0548.html" > https://errata.almalinux.org/8/ALSA-2021-0548.html< / a > < br > < a href = "https://github.com/advisories/GHSA-p9pc-299p-vxgp" > https://github.com/advisories/GHSA-p9pc-299p-vxgp< / a > < br > < a href = "https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2" > https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2< / a > < br > < a href = "https://linux.oracle.com/cve/CVE-2020-7608.html" > https://linux.oracle.com/cve/CVE-2020-7608.html< / a > < br > < a href = "https://linux.oracle.com/errata/ELSA-2021-0548.html" > https://linux.oracle.com/errata/ELSA-2021-0548.html< / a > < br > < a href = "https://nvd.nist.gov/vuln/detail/CVE-2020-7608" > https://nvd.nist.gov/vuln/detail/CVE-2020-7608< / a > < br > < a href = "https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381" > https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381< / a > < br > < a href = "https://www.npmjs.com/advisories/1500" > https://www.npmjs.com/advisories/1500< / a > < br > < / details > |