565 lines
821 KiB
Markdown
565 lines
821 KiB
Markdown
---
|
||
hide:
|
||
- toc
|
||
---
|
||
|
||
# Security Overview
|
||
|
||
<link href="https://truecharts.org/_static/trivy.css" type="text/css" rel="stylesheet" />
|
||
|
||
## Helm-Chart
|
||
|
||
##### Scan Results
|
||
|
||
#### Chart Object: pixapop/templates/common.yaml
|
||
|
||
|
||
|
||
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|
||
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
|
||
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container 'RELEASE-NAME-pixapop' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.allowPrivilegeEscalation' to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
|
||
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.allowPrivilegeEscalation' to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
|
||
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container 'RELEASE-NAME-pixapop' of Deployment 'RELEASE-NAME-pixapop' should add 'ALL' to 'securityContext.capabilities.drop' </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
|
||
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should add 'ALL' to 'securityContext.capabilities.drop' </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
|
||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'RELEASE-NAME-pixapop' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv012">https://avd.aquasec.com/misconfig/ksv012</a><br></details> |
|
||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv012">https://avd.aquasec.com/misconfig/ksv012</a><br></details> |
|
||
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container 'RELEASE-NAME-pixapop' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.readOnlyRootFilesystem' to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
|
||
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.readOnlyRootFilesystem' to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
|
||
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.privileged' to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/misconfig/ksv017">https://avd.aquasec.com/misconfig/ksv017</a><br></details> |
|
||
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'RELEASE-NAME-pixapop' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.runAsUser' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
|
||
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.runAsUser' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
|
||
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'RELEASE-NAME-pixapop' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.runAsGroup' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
|
||
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'prepare' of Deployment 'RELEASE-NAME-pixapop' should set 'securityContext.runAsGroup' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
|
||
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
|
||
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
|
||
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root UID. <br> <hr> <br> securityContext.runAsUser should be set to a value greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv105">https://avd.aquasec.com/misconfig/ksv105</a><br></details> |
|
||
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root UID. <br> <hr> <br> securityContext.runAsUser should be set to a value greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv105">https://avd.aquasec.com/misconfig/ksv105</a><br></details> |
|
||
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
|
||
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
|
||
|
||
## Containers
|
||
|
||
##### Detected Containers
|
||
|
||
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
|
||
tccr.io/truecharts/pixapop:v1.2-ls15@sha256:6a05383524fcd51b0b692d508dd16ed6948337aa272677e01baa6d8ba119c070
|
||
|
||
##### Scan Results
|
||
|
||
|
||
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
|
||
|
||
|
||
**ubuntu**
|
||
|
||
|
||
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|
||
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
|
||
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
|
||
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
|
||
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
|
||
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&m=165056234501732&w=2">https://marc.info/?l=linux-ext4&m=165056234501732&w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
|
||
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
|
||
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
|
||
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&m=165056234501732&w=2">https://marc.info/?l=linux-ext4&m=165056234501732&w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
|
||
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
|
||
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
|
||
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&m=165056234501732&w=2">https://marc.info/?l=linux-ext4&m=165056234501732&w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
|
||
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
|
||
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
|
||
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
|
||
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
|
||
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
|
||
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1586">https://access.redhat.com/security/cve/CVE-2022-1586</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077976,">https://bugzilla.redhat.com/show_bug.cgi?id=2077976,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,">https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c">https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1586.html">https://linux.oracle.com/cve/CVE-2022-1586.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">https://nvd.nist.gov/vuln/detail/CVE-2022-1586</a><br></details> |
|
||
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1587">https://access.redhat.com/security/cve/CVE-2022-1587</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077983,">https://bugzilla.redhat.com/show_bug.cgi?id=2077983,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0">https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1587.html">https://linux.oracle.com/cve/CVE-2022-1587.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">https://nvd.nist.gov/vuln/detail/CVE-2022-1587</a><br></details> |
|
||
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
|
||
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
|
||
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/HT211168">https://support.apple.com/HT211168</a><br><a href="https://support.apple.com/HT211170">https://support.apple.com/HT211170</a><br><a href="https://support.apple.com/HT211171">https://support.apple.com/HT211171</a><br><a href="https://support.apple.com/HT211175">https://support.apple.com/HT211175</a><br><a href="https://support.apple.com/HT211178">https://support.apple.com/HT211178</a><br><a href="https://support.apple.com/HT211179">https://support.apple.com/HT211179</a><br><a href="https://support.apple.com/HT211181">https://support.apple.com/HT211181</a><br><a href="https://vuldb.com/?id.155768">https://vuldb.com/?id.155768</a><br></details> |
|
||
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/en-us/HT211935">https://support.apple.com/en-us/HT211935</a><br><a href="https://support.apple.com/en-us/HT211952">https://support.apple.com/en-us/HT211952</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details> |
|
||
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211847">https://support.apple.com/en-us/HT211847</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/kb/HT211846">https://support.apple.com/kb/HT211846</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details> |
|
||
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&m=165056234501732&w=2">https://marc.info/?l=linux-ext4&m=165056234501732&w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
|
||
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">https://nvd.nist.gov/vuln/detail/CVE-2022-2068</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.debian.org/security/2022/dsa-5169">https://www.debian.org/security/2022/dsa-5169</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
|
||
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
|
||
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
|
||
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
|
||
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&m=165056234501732&w=2">https://marc.info/?l=linux-ext4&m=165056234501732&w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
|
||
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
|
||
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
|
||
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
|
||
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
|
||
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
|
||
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">https://nvd.nist.gov/vuln/detail/CVE-2022-2068</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.debian.org/security/2022/dsa-5169">https://www.debian.org/security/2022/dsa-5169</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
|
||
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
|
||
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
|
||
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
|
||
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
|
||
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14147">https://access.redhat.com/security/cve/CVE-2020-14147</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147</a><br><a href="https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571">https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571</a><br><a href="https://github.com/antirez/redis/pull/6875">https://github.com/antirez/redis/pull/6875</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14147">https://nvd.nist.gov/vuln/detail/CVE-2020-14147</a><br><a href="https://security.gentoo.org/glsa/202008-17">https://security.gentoo.org/glsa/202008-17</a><br><a href="https://www.debian.org/security/2020/dsa-4731">https://www.debian.org/security/2020/dsa-4731</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details> |
|
||
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32626">https://access.redhat.com/security/cve/CVE-2021-32626</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591">https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c">https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32626.html">https://linux.oracle.com/cve/CVE-2021-32626.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E">https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">https://nvd.nist.gov/vuln/detail/CVE-2021-32626</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32627">https://access.redhat.com/security/cve/CVE-2021-32627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v">https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32627.html">https://linux.oracle.com/cve/CVE-2021-32627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">https://nvd.nist.gov/vuln/detail/CVE-2021-32627</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32628">https://access.redhat.com/security/cve/CVE-2021-32628</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr">https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32628.html">https://linux.oracle.com/cve/CVE-2021-32628.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">https://nvd.nist.gov/vuln/detail/CVE-2021-32628</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32672">https://access.redhat.com/security/cve/CVE-2021-32672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672</a><br><a href="https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd">https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm">https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">https://nvd.nist.gov/vuln/detail/CVE-2021-32672</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32675">https://access.redhat.com/security/cve/CVE-2021-32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8">https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32675.html">https://linux.oracle.com/cve/CVE-2021-32675.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E">https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">https://nvd.nist.gov/vuln/detail/CVE-2021-32675</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32687">https://access.redhat.com/security/cve/CVE-2021-32687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f">https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q">https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32687.html">https://linux.oracle.com/cve/CVE-2021-32687.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">https://nvd.nist.gov/vuln/detail/CVE-2021-32687</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41099">https://access.redhat.com/security/cve/CVE-2021-41099</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521">https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph">https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41099.html">https://linux.oracle.com/cve/CVE-2021-41099.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">https://nvd.nist.gov/vuln/detail/CVE-2021-41099</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14147">https://access.redhat.com/security/cve/CVE-2020-14147</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147</a><br><a href="https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571">https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571</a><br><a href="https://github.com/antirez/redis/pull/6875">https://github.com/antirez/redis/pull/6875</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14147">https://nvd.nist.gov/vuln/detail/CVE-2020-14147</a><br><a href="https://security.gentoo.org/glsa/202008-17">https://security.gentoo.org/glsa/202008-17</a><br><a href="https://www.debian.org/security/2020/dsa-4731">https://www.debian.org/security/2020/dsa-4731</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details> |
|
||
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32626">https://access.redhat.com/security/cve/CVE-2021-32626</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591">https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c">https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32626.html">https://linux.oracle.com/cve/CVE-2021-32626.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E">https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">https://nvd.nist.gov/vuln/detail/CVE-2021-32626</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32627">https://access.redhat.com/security/cve/CVE-2021-32627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v">https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32627.html">https://linux.oracle.com/cve/CVE-2021-32627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">https://nvd.nist.gov/vuln/detail/CVE-2021-32627</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32628">https://access.redhat.com/security/cve/CVE-2021-32628</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr">https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32628.html">https://linux.oracle.com/cve/CVE-2021-32628.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">https://nvd.nist.gov/vuln/detail/CVE-2021-32628</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32672">https://access.redhat.com/security/cve/CVE-2021-32672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672</a><br><a href="https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd">https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm">https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">https://nvd.nist.gov/vuln/detail/CVE-2021-32672</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32675">https://access.redhat.com/security/cve/CVE-2021-32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8">https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32675.html">https://linux.oracle.com/cve/CVE-2021-32675.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E">https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">https://nvd.nist.gov/vuln/detail/CVE-2021-32675</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32687">https://access.redhat.com/security/cve/CVE-2021-32687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f">https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q">https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32687.html">https://linux.oracle.com/cve/CVE-2021-32687.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">https://nvd.nist.gov/vuln/detail/CVE-2021-32687</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41099">https://access.redhat.com/security/cve/CVE-2021-41099</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521">https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph">https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41099.html">https://linux.oracle.com/cve/CVE-2021-41099.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">https://nvd.nist.gov/vuln/detail/CVE-2021-41099</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
|
||
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
|
||
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
|
||
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
|
||
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
|
||
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
|
||
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
|
||
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
|
||
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
|
||
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
|
||
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
|
||
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
|
||
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
|
||
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
|
||
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
|
||
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
|
||
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-31879">https://access.redhat.com/security/cve/CVE-2021-31879</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31879">https://nvd.nist.gov/vuln/detail/CVE-2021-31879</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
|
||
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
|
||
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
|
||
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
|
||
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
|
||
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
|
||
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
|
||
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
|
||
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
|
||
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
|
||
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
|
||
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
|
||
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
|
||
|
||
|
||
#### Container: tccr.io/truecharts/pixapop:v1.2-ls15@sha256:6a05383524fcd51b0b692d508dd16ed6948337aa272677e01baa6d8ba119c070 (alpine 3.12)
|
||
|
||
|
||
**alpine**
|
||
|
||
|
||
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|
||
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
|
||
| apache2-utils | CVE-2021-26691 | CRITICAL | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/7">http://www.openwall.com/lists/oss-security/2021/06/10/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-26691">https://access.redhat.com/security/cve/CVE-2021-26691</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-26691">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-26691</a><br><a href="https://linux.oracle.com/cve/CVE-2021-26691.html">https://linux.oracle.com/cve/CVE-2021-26691.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0143.html">https://linux.oracle.com/errata/ELSA-2022-0143.html</a><br><a href="https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe@%3Cannounce.httpd.apache.org%3E">https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe@%3Cannounce.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">https://nvd.nist.gov/vuln/detail/CVE-2021-26691</a><br><a href="https://security.gentoo.org/glsa/202107-38">https://security.gentoo.org/glsa/202107-38</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0001/">https://security.netapp.com/advisory/ntap-20210702-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4994-1">https://ubuntu.com/security/notices/USN-4994-1</a><br><a href="https://ubuntu.com/security/notices/USN-4994-2">https://ubuntu.com/security/notices/USN-4994-2</a><br><a href="https://www.debian.org/security/2021/dsa-4937">https://www.debian.org/security/2021/dsa-4937</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-39275 | CRITICAL | 2.4.46-r1 | 2.4.49-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-39275">https://access.redhat.com/security/cve/CVE-2021-39275</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275</a><br><a href="https://linux.oracle.com/cve/CVE-2021-39275.html">https://linux.oracle.com/cve/CVE-2021-39275.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9005.html">https://linux.oracle.com/errata/ELSA-2022-9005.html</a><br><a href="https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">https://nvd.nist.gov/vuln/detail/CVE-2021-39275</a><br><a href="https://security.netapp.com/advisory/ntap-20211008-0004/">https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href="https://ubuntu.com/security/notices/USN-5090-1">https://ubuntu.com/security/notices/USN-5090-1</a><br><a href="https://ubuntu.com/security/notices/USN-5090-2">https://ubuntu.com/security/notices/USN-5090-2</a><br><a href="https://www.debian.org/security/2021/dsa-4982">https://www.debian.org/security/2021/dsa-4982</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-40438 | CRITICAL | 2.4.46-r1 | 2.4.49-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-40438">https://access.redhat.com/security/cve/CVE-2021-40438</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438</a><br><a href="https://linux.oracle.com/cve/CVE-2021-40438.html">https://linux.oracle.com/cve/CVE-2021-40438.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3856.html">https://linux.oracle.com/errata/ELSA-2021-3856.html</a><br><a href="https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">https://nvd.nist.gov/vuln/detail/CVE-2021-40438</a><br><a href="https://security.netapp.com/advisory/ntap-20211008-0004/">https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href="https://ubuntu.com/security/notices/USN-5090-1">https://ubuntu.com/security/notices/USN-5090-1</a><br><a href="https://ubuntu.com/security/notices/USN-5090-2">https://ubuntu.com/security/notices/USN-5090-2</a><br><a href="https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)">https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5090-3 (regression update)">https://ubuntu.com/security/notices/USN-5090-3 (regression update)</a><br><a href="https://www.debian.org/security/2021/dsa-4982">https://www.debian.org/security/2021/dsa-4982</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.tenable.com/security/tns-2021-17">https://www.tenable.com/security/tns-2021-17</a><br></details> |
|
||
| apache2-utils | CVE-2021-42013 | CRITICAL | 2.4.46-r1 | 2.4.51-r0 | <details><summary>Expand...</summary><a href="http://jvn.jp/en/jp/JVN51106450/index.html">http://jvn.jp/en/jp/JVN51106450/index.html</a><br><a href="http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html">http://packetstormsecurity.com/files/164501/Apache-HTTP-Server-2.4.50-Path-Traversal-Code-Execution.html</a><br><a href="http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html">http://packetstormsecurity.com/files/164609/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html</a><br><a href="http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html">http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html</a><br><a href="http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html">http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html</a><br><a href="http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html">http://packetstormsecurity.com/files/165089/Apache-HTTP-Server-2.4.50-CVE-2021-42013-Exploitation.html</a><br><a href="http://packetstormsecurity.com/files/167397/Apache-2.4.50-Remote-Code-Execution.html">http://packetstormsecurity.com/files/167397/Apache-2.4.50-Remote-Code-Execution.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/07/6">http://www.openwall.com/lists/oss-security/2021/10/07/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/1">http://www.openwall.com/lists/oss-security/2021/10/08/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/2">http://www.openwall.com/lists/oss-security/2021/10/08/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/3">http://www.openwall.com/lists/oss-security/2021/10/08/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/4">http://www.openwall.com/lists/oss-security/2021/10/08/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/5">http://www.openwall.com/lists/oss-security/2021/10/08/5</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/6">http://www.openwall.com/lists/oss-security/2021/10/08/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/09/1">http://www.openwall.com/lists/oss-security/2021/10/09/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/11/4">http://www.openwall.com/lists/oss-security/2021/10/11/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/15/3">http://www.openwall.com/lists/oss-security/2021/10/15/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/16/1">http://www.openwall.com/lists/oss-security/2021/10/16/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-42013">https://access.redhat.com/security/cve/CVE-2021-42013</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0009/">https://security.netapp.com/advisory/ntap-20211029-0009/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.povilaika.com/apache-2-4-50-exploit/">https://www.povilaika.com/apache-2-4-50-exploit/</a><br></details> |
|
||
| apache2-utils | CVE-2021-44790 | CRITICAL | 2.4.46-r1 | 2.4.52-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2021/12/20/4">http://www.openwall.com/lists/oss-security/2021/12/20/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-44790">https://access.redhat.com/security/cve/CVE-2021-44790</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-44790.html">https://linux.oracle.com/cve/CVE-2021-44790.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0258.html">https://linux.oracle.com/errata/ELSA-2022-0258.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">https://nvd.nist.gov/vuln/detail/CVE-2021-44790</a><br><a href="https://security.netapp.com/advisory/ntap-20211224-0001/">https://security.netapp.com/advisory/ntap-20211224-0001/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5212-1">https://ubuntu.com/security/notices/USN-5212-1</a><br><a href="https://ubuntu.com/security/notices/USN-5212-2">https://ubuntu.com/security/notices/USN-5212-2</a><br><a href="https://www.debian.org/security/2022/dsa-5035">https://www.debian.org/security/2022/dsa-5035</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-01">https://www.tenable.com/security/tns-2022-01</a><br><a href="https://www.tenable.com/security/tns-2022-03">https://www.tenable.com/security/tns-2022-03</a><br></details> |
|
||
| apache2-utils | CVE-2022-22720 | CRITICAL | 2.4.46-r1 | 2.4.53-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/14/3">http://www.openwall.com/lists/oss-security/2022/03/14/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22720">https://access.redhat.com/security/cve/CVE-2022-22720</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22720.html">https://linux.oracle.com/cve/CVE-2022-22720.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9257.html">https://linux.oracle.com/errata/ELSA-2022-9257.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">https://nvd.nist.gov/vuln/detail/CVE-2022-22720</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0001/">https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5333-1">https://ubuntu.com/security/notices/USN-5333-1</a><br><a href="https://ubuntu.com/security/notices/USN-5333-2">https://ubuntu.com/security/notices/USN-5333-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2022-22721 | CRITICAL | 2.4.46-r1 | 2.4.53-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/14/2">http://www.openwall.com/lists/oss-security/2022/03/14/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22721">https://access.redhat.com/security/cve/CVE-2022-22721</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">https://nvd.nist.gov/vuln/detail/CVE-2022-22721</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0001/">https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5333-1">https://ubuntu.com/security/notices/USN-5333-1</a><br><a href="https://ubuntu.com/security/notices/USN-5333-2">https://ubuntu.com/security/notices/USN-5333-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2022-23943 | CRITICAL | 2.4.46-r1 | 2.4.53-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/14/1">http://www.openwall.com/lists/oss-security/2022/03/14/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-23943">https://access.redhat.com/security/cve/CVE-2022-23943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">https://nvd.nist.gov/vuln/detail/CVE-2022-23943</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0001/">https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5333-1">https://ubuntu.com/security/notices/USN-5333-1</a><br><a href="https://ubuntu.com/security/notices/USN-5333-2">https://ubuntu.com/security/notices/USN-5333-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-08">https://www.tenable.com/security/tns-2022-08</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| apache2-utils | CVE-2019-17657 | HIGH | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="https://fortiguard.com/psirt/FG-IR-19-013">https://fortiguard.com/psirt/FG-IR-19-013</a><br></details> |
|
||
| apache2-utils | CVE-2020-13950 | HIGH | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/4">http://www.openwall.com/lists/oss-security/2021/06/10/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13950">https://access.redhat.com/security/cve/CVE-2020-13950</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-13950">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-13950</a><br><a href="https://linux.oracle.com/cve/CVE-2020-13950.html">https://linux.oracle.com/cve/CVE-2020-13950.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5163.html">https://linux.oracle.com/errata/ELSA-2022-5163.html</a><br><a href="https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbe197409ae4a58b629fb792d1aed541ccbbf865121a80e1c5938d223@%3Cannounce.httpd.apache.org%3E">https://lists.apache.org/thread.html/rbe197409ae4a58b629fb792d1aed541ccbbf865121a80e1c5938d223@%3Cannounce.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13950">https://nvd.nist.gov/vuln/detail/CVE-2020-13950</a><br><a href="https://security.gentoo.org/glsa/202107-38">https://security.gentoo.org/glsa/202107-38</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0001/">https://security.netapp.com/advisory/ntap-20210702-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4994-1">https://ubuntu.com/security/notices/USN-4994-1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| apache2-utils | CVE-2020-35452 | HIGH | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/5">http://www.openwall.com/lists/oss-security/2021/06/10/5</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-35452">https://access.redhat.com/security/cve/CVE-2020-35452</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1915.html">https://errata.almalinux.org/8/ALSA-2022-1915.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-35452">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-35452</a><br><a href="https://linux.oracle.com/cve/CVE-2020-35452.html">https://linux.oracle.com/cve/CVE-2020-35452.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1915.html">https://linux.oracle.com/errata/ELSA-2022-1915.html</a><br><a href="https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602@%3Cannounce.httpd.apache.org%3E">https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602@%3Cannounce.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">https://nvd.nist.gov/vuln/detail/CVE-2020-35452</a><br><a href="https://security.gentoo.org/glsa/202107-38">https://security.gentoo.org/glsa/202107-38</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0001/">https://security.netapp.com/advisory/ntap-20210702-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4994-1">https://ubuntu.com/security/notices/USN-4994-1</a><br><a href="https://ubuntu.com/security/notices/USN-4994-2">https://ubuntu.com/security/notices/USN-4994-2</a><br><a href="https://www.debian.org/security/2021/dsa-4937">https://www.debian.org/security/2021/dsa-4937</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-26690 | HIGH | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/6">http://www.openwall.com/lists/oss-security/2021/06/10/6</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-26690">https://access.redhat.com/security/cve/CVE-2021-26690</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-26690">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-26690</a><br><a href="https://linux.oracle.com/cve/CVE-2021-26690.html">https://linux.oracle.com/cve/CVE-2021-26690.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-9545.html">https://linux.oracle.com/errata/ELSA-2021-9545.html</a><br><a href="https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865@%3Cannounce.httpd.apache.org%3E">https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865@%3Cannounce.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">https://nvd.nist.gov/vuln/detail/CVE-2021-26690</a><br><a href="https://security.gentoo.org/glsa/202107-38">https://security.gentoo.org/glsa/202107-38</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0001/">https://security.netapp.com/advisory/ntap-20210702-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4994-1">https://ubuntu.com/security/notices/USN-4994-1</a><br><a href="https://ubuntu.com/security/notices/USN-4994-2">https://ubuntu.com/security/notices/USN-4994-2</a><br><a href="https://www.debian.org/security/2021/dsa-4937">https://www.debian.org/security/2021/dsa-4937</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-31618 | HIGH | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/9">http://www.openwall.com/lists/oss-security/2021/06/10/9</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-31618">https://access.redhat.com/security/cve/CVE-2021-31618</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://lists.apache.org/thread.html/r14b66ef0f4f569fd515a3f96cd4eb58bd9a8ff525cc326bb0359664f@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r14b66ef0f4f569fd515a3f96cd4eb58bd9a8ff525cc326bb0359664f@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r783b6558abf3305b17ea462bed4bd66d82866438999bf38cef6d11d1@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r783b6558abf3305b17ea462bed4bd66d82866438999bf38cef6d11d1@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NKJ3ZA3FTSZ2QBBPKS6BYGAWYRABNQQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NKJ3ZA3FTSZ2QBBPKS6BYGAWYRABNQQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/</a><br><a href="https://seclists.org/oss-sec/2021/q2/206">https://seclists.org/oss-sec/2021/q2/206</a><br><a href="https://security.gentoo.org/glsa/202107-38">https://security.gentoo.org/glsa/202107-38</a><br><a href="https://security.netapp.com/advisory/ntap-20210727-0008/">https://security.netapp.com/advisory/ntap-20210727-0008/</a><br><a href="https://www.debian.org/security/2021/dsa-4937">https://www.debian.org/security/2021/dsa-4937</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-33193 | HIGH | 2.4.46-r1 | 2.4.49-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-33193">https://access.redhat.com/security/cve/CVE-2021-33193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1915.html">https://errata.almalinux.org/8/ALSA-2022-1915.html</a><br><a href="https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch">https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch</a><br><a href="https://linux.oracle.com/cve/CVE-2021-33193.html">https://linux.oracle.com/cve/CVE-2021-33193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9276.html">https://linux.oracle.com/errata/ELSA-2022-9276.html</a><br><a href="https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33193">https://nvd.nist.gov/vuln/detail/CVE-2021-33193</a><br><a href="https://portswigger.net/research/http2">https://portswigger.net/research/http2</a><br><a href="https://security.netapp.com/advisory/ntap-20210917-0004/">https://security.netapp.com/advisory/ntap-20210917-0004/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href="https://ubuntu.com/security/notices/USN-5090-1">https://ubuntu.com/security/notices/USN-5090-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.tenable.com/security/tns-2021-17">https://www.tenable.com/security/tns-2021-17</a><br></details> |
|
||
| apache2-utils | CVE-2021-34798 | HIGH | 2.4.46-r1 | 2.4.49-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-34798">https://access.redhat.com/security/cve/CVE-2021-34798</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10379">https://kc.mcafee.com/corporate/index?page=content&id=SB10379</a><br><a href="https://linux.oracle.com/cve/CVE-2021-34798.html">https://linux.oracle.com/cve/CVE-2021-34798.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9005.html">https://linux.oracle.com/errata/ELSA-2022-9005.html</a><br><a href="https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">https://nvd.nist.gov/vuln/detail/CVE-2021-34798</a><br><a href="https://security.netapp.com/advisory/ntap-20211008-0004/">https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href="https://ubuntu.com/security/notices/USN-5090-1">https://ubuntu.com/security/notices/USN-5090-1</a><br><a href="https://ubuntu.com/security/notices/USN-5090-2">https://ubuntu.com/security/notices/USN-5090-2</a><br><a href="https://www.debian.org/security/2021/dsa-4982">https://www.debian.org/security/2021/dsa-4982</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.tenable.com/security/tns-2021-17">https://www.tenable.com/security/tns-2021-17</a><br></details> |
|
||
| apache2-utils | CVE-2021-36160 | HIGH | 2.4.46-r1 | 2.4.49-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-36160">https://access.redhat.com/security/cve/CVE-2021-36160</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1915.html">https://errata.almalinux.org/8/ALSA-2022-1915.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36160.html">https://linux.oracle.com/cve/CVE-2021-36160.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1915.html">https://linux.oracle.com/errata/ELSA-2022-1915.html</a><br><a href="https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a@%3Cbugs.httpd.apache.org%3E">https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a@%3Cbugs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36160">https://nvd.nist.gov/vuln/detail/CVE-2021-36160</a><br><a href="https://security.netapp.com/advisory/ntap-20211008-0004/">https://security.netapp.com/advisory/ntap-20211008-0004/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ</a><br><a href="https://ubuntu.com/security/notices/USN-5090-1">https://ubuntu.com/security/notices/USN-5090-1</a><br><a href="https://www.debian.org/security/2021/dsa-4982">https://www.debian.org/security/2021/dsa-4982</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-41524 | HIGH | 2.4.46-r1 | 2.4.50-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/05/1">http://www.openwall.com/lists/oss-security/2021/10/05/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-41524">https://access.redhat.com/security/cve/CVE-2021-41524</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41524">https://nvd.nist.gov/vuln/detail/CVE-2021-41524</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0009/">https://security.netapp.com/advisory/ntap-20211029-0009/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-41773 | HIGH | 2.4.46-r1 | 2.4.50-r0 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html">http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal-Remote-Code-Execution.html</a><br><a href="http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html">http://packetstormsecurity.com/files/164418/Apache-HTTP-Server-2.4.49-Path-Traversal.html</a><br><a href="http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html">http://packetstormsecurity.com/files/164629/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution.html</a><br><a href="http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html">http://packetstormsecurity.com/files/164941/Apache-HTTP-Server-2.4.50-Remote-Code-Execution.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/05/2">http://www.openwall.com/lists/oss-security/2021/10/05/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/07/1">http://www.openwall.com/lists/oss-security/2021/10/07/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/07/6">http://www.openwall.com/lists/oss-security/2021/10/07/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/1">http://www.openwall.com/lists/oss-security/2021/10/08/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/2">http://www.openwall.com/lists/oss-security/2021/10/08/2</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/3">http://www.openwall.com/lists/oss-security/2021/10/08/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/4">http://www.openwall.com/lists/oss-security/2021/10/08/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/5">http://www.openwall.com/lists/oss-security/2021/10/08/5</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/08/6">http://www.openwall.com/lists/oss-security/2021/10/08/6</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/09/1">http://www.openwall.com/lists/oss-security/2021/10/09/1</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/11/4">http://www.openwall.com/lists/oss-security/2021/10/11/4</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/15/3">http://www.openwall.com/lists/oss-security/2021/10/15/3</a><br><a href="http://www.openwall.com/lists/oss-security/2021/10/16/1">http://www.openwall.com/lists/oss-security/2021/10/16/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-41773">https://access.redhat.com/security/cve/CVE-2021-41773</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3@%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E">https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E">https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb@%3Cusers.httpd.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41773">https://nvd.nist.gov/vuln/detail/CVE-2021-41773</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0009/">https://security.netapp.com/advisory/ntap-20211029-0009/</a><br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-pathtrv-LAzg68cZ</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2021-44224 | HIGH | 2.4.46-r1 | 2.4.52-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2021/12/20/3">http://www.openwall.com/lists/oss-security/2021/12/20/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-44224">https://access.redhat.com/security/cve/CVE-2021-44224</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1915.html">https://errata.almalinux.org/8/ALSA-2022-1915.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-44224.html">https://linux.oracle.com/cve/CVE-2021-44224.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1915.html">https://linux.oracle.com/errata/ELSA-2022-1915.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">https://nvd.nist.gov/vuln/detail/CVE-2021-44224</a><br><a href="https://security.netapp.com/advisory/ntap-20211224-0001/">https://security.netapp.com/advisory/ntap-20211224-0001/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5212-1">https://ubuntu.com/security/notices/USN-5212-1</a><br><a href="https://ubuntu.com/security/notices/USN-5212-2">https://ubuntu.com/security/notices/USN-5212-2</a><br><a href="https://www.debian.org/security/2022/dsa-5035">https://www.debian.org/security/2022/dsa-5035</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-01">https://www.tenable.com/security/tns-2022-01</a><br><a href="https://www.tenable.com/security/tns-2022-03">https://www.tenable.com/security/tns-2022-03</a><br></details> |
|
||
| apache2-utils | CVE-2022-22719 | HIGH | 2.4.46-r1 | 2.4.53-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/14/4">http://www.openwall.com/lists/oss-security/2022/03/14/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22719">https://access.redhat.com/security/cve/CVE-2022-22719</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">https://nvd.nist.gov/vuln/detail/CVE-2022-22719</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0001/">https://security.netapp.com/advisory/ntap-20220321-0001/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5333-1">https://ubuntu.com/security/notices/USN-5333-1</a><br><a href="https://ubuntu.com/security/notices/USN-5333-2">https://ubuntu.com/security/notices/USN-5333-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| apache2-utils | CVE-2020-13938 | MEDIUM | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/3">http://www.openwall.com/lists/oss-security/2021/06/10/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-13938">https://access.redhat.com/security/cve/CVE-2020-13938</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10379">https://kc.mcafee.com/corporate/index?page=content&id=SB10379</a><br><a href="https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30@%3Cannounce.httpd.apache.org%3E">https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30@%3Cannounce.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0001/">https://security.netapp.com/advisory/ntap-20210702-0001/</a><br></details> |
|
||
| apache2-utils | CVE-2021-30641 | MEDIUM | 2.4.46-r1 | 2.4.48-r0 | <details><summary>Expand...</summary><a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="http://www.openwall.com/lists/oss-security/2021/06/10/8">http://www.openwall.com/lists/oss-security/2021/06/10/8</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-30641">https://access.redhat.com/security/cve/CVE-2021-30641</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a><br><a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-30641">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-30641</a><br><a href="https://linux.oracle.com/cve/CVE-2021-30641.html">https://linux.oracle.com/cve/CVE-2021-30641.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4257.html">https://linux.oracle.com/errata/ELSA-2021-4257.html</a><br><a href="https://lists.apache.org/thread.html/r2b4773944d83d2799de9fbaeee7fe0f3fd72669467787e02f434cb10@%3Cannounce.httpd.apache.org%3E">https://lists.apache.org/thread.html/r2b4773944d83d2799de9fbaeee7fe0f3fd72669467787e02f434cb10@%3Cannounce.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E">https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E">https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">https://nvd.nist.gov/vuln/detail/CVE-2021-30641</a><br><a href="https://security.gentoo.org/glsa/202107-38">https://security.gentoo.org/glsa/202107-38</a><br><a href="https://security.netapp.com/advisory/ntap-20210702-0001/">https://security.netapp.com/advisory/ntap-20210702-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4994-1">https://ubuntu.com/security/notices/USN-4994-1</a><br><a href="https://ubuntu.com/security/notices/USN-4994-2">https://ubuntu.com/security/notices/USN-4994-2</a><br><a href="https://www.debian.org/security/2021/dsa-4937">https://www.debian.org/security/2021/dsa-4937</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| apk-tools | CVE-2021-36159 | CRITICAL | 2.10.6-r0 | 2.10.7-r0 | <details><summary>Expand...</summary><a href="https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch">https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch</a><br><a href="https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749">https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br></details> |
|
||
| avahi-libs | CVE-2021-3468 | MEDIUM | 0.8-r0 | 0.8-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3468">https://access.redhat.com/security/cve/CVE-2021-3468</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1939614">https://bugzilla.redhat.com/show_bug.cgi?id=1939614</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">https://nvd.nist.gov/vuln/detail/CVE-2021-3468</a><br><a href="https://ubuntu.com/security/notices/USN-5008-1">https://ubuntu.com/security/notices/USN-5008-1</a><br><a href="https://ubuntu.com/security/notices/USN-5008-2">https://ubuntu.com/security/notices/USN-5008-2</a><br></details> |
|
||
| busybox | CVE-2022-28391 | CRITICAL | 1.31.1-r20 | 1.31.1-r22 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
|
||
| busybox | CVE-2021-42378 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42378">https://access.redhat.com/security/cve/CVE-2021-42378</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42378">https://nvd.nist.gov/vuln/detail/CVE-2021-42378</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42379 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42379">https://access.redhat.com/security/cve/CVE-2021-42379</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42379">https://nvd.nist.gov/vuln/detail/CVE-2021-42379</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42380 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42380">https://access.redhat.com/security/cve/CVE-2021-42380</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42380">https://nvd.nist.gov/vuln/detail/CVE-2021-42380</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42381 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42381">https://access.redhat.com/security/cve/CVE-2021-42381</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42381">https://nvd.nist.gov/vuln/detail/CVE-2021-42381</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42382 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42382">https://access.redhat.com/security/cve/CVE-2021-42382</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42382">https://nvd.nist.gov/vuln/detail/CVE-2021-42382</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42383 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42383">https://access.redhat.com/security/cve/CVE-2021-42383</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br></details> |
|
||
| busybox | CVE-2021-42384 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42384">https://access.redhat.com/security/cve/CVE-2021-42384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42384">https://nvd.nist.gov/vuln/detail/CVE-2021-42384</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42385 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42385">https://access.redhat.com/security/cve/CVE-2021-42385</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42385">https://nvd.nist.gov/vuln/detail/CVE-2021-42385</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42386 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42386">https://access.redhat.com/security/cve/CVE-2021-42386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42386">https://nvd.nist.gov/vuln/detail/CVE-2021-42386</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| busybox | CVE-2021-42374 | MEDIUM | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42374">https://access.redhat.com/security/cve/CVE-2021-42374</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42374">https://nvd.nist.gov/vuln/detail/CVE-2021-42374</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| cairo | CVE-2019-6462 | MEDIUM | 1.16.0-r3 | 1.16.0-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6462">https://access.redhat.com/security/cve/CVE-2019-6462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/353">https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">https://nvd.nist.gov/vuln/detail/CVE-2019-6462</a><br><a href="https://ubuntu.com/security/notices/USN-5407-1">https://ubuntu.com/security/notices/USN-5407-1</a><br></details> |
|
||
| cairo-gobject | CVE-2019-6462 | MEDIUM | 1.16.0-r3 | 1.16.0-r5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-6462">https://access.redhat.com/security/cve/CVE-2019-6462</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462</a><br><a href="https://github.com/TeamSeri0us/pocs/tree/master/gerbv">https://github.com/TeamSeri0us/pocs/tree/master/gerbv</a><br><a href="https://gitlab.freedesktop.org/cairo/cairo/issues/353">https://gitlab.freedesktop.org/cairo/cairo/issues/353</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">https://nvd.nist.gov/vuln/detail/CVE-2019-6462</a><br><a href="https://ubuntu.com/security/notices/USN-5407-1">https://ubuntu.com/security/notices/USN-5407-1</a><br></details> |
|
||
| expat | CVE-2022-22822 | CRITICAL | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22822">https://access.redhat.com/security/cve/CVE-2022-22822</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22822.html">https://linux.oracle.com/cve/CVE-2022-22822.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">https://nvd.nist.gov/vuln/detail/CVE-2022-22822</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-22823 | CRITICAL | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22823">https://access.redhat.com/security/cve/CVE-2022-22823</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22823.html">https://linux.oracle.com/cve/CVE-2022-22823.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">https://nvd.nist.gov/vuln/detail/CVE-2022-22823</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-22824 | CRITICAL | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22824">https://access.redhat.com/security/cve/CVE-2022-22824</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22824.html">https://linux.oracle.com/cve/CVE-2022-22824.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">https://nvd.nist.gov/vuln/detail/CVE-2022-22824</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-23852 | CRITICAL | 2.2.9-r1 | 2.2.10-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23852">https://access.redhat.com/security/cve/CVE-2022-23852</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852</a><br><a href="https://github.com/libexpat/libexpat/pull/550">https://github.com/libexpat/libexpat/pull/550</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23852.html">https://linux.oracle.com/cve/CVE-2022-23852.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">https://nvd.nist.gov/vuln/detail/CVE-2022-23852</a><br><a href="https://security.netapp.com/advisory/ntap-20220217-0001/">https://security.netapp.com/advisory/ntap-20220217-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-23990 | CRITICAL | 2.2.9-r1 | 2.2.10-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23990">https://access.redhat.com/security/cve/CVE-2022-23990</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990</a><br><a href="https://github.com/libexpat/libexpat/pull/551">https://github.com/libexpat/libexpat/pull/551</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23990.html">https://linux.oracle.com/cve/CVE-2022-23990.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9232.html">https://linux.oracle.com/errata/ELSA-2022-9232.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">https://nvd.nist.gov/vuln/detail/CVE-2022-23990</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-25235 | CRITICAL | 2.2.9-r1 | 2.2.10-r2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25235">https://access.redhat.com/security/cve/CVE-2022-25235</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235</a><br><a href="https://github.com/libexpat/libexpat/pull/562">https://github.com/libexpat/libexpat/pull/562</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)">https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)">https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25235.html">https://linux.oracle.com/cve/CVE-2022-25235.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9359.html">https://linux.oracle.com/errata/ELSA-2022-9359.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">https://nvd.nist.gov/vuln/detail/CVE-2022-25235</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| expat | CVE-2022-25236 | CRITICAL | 2.2.9-r1 | 2.2.10-r2 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html">http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html</a><br><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25236">https://access.redhat.com/security/cve/CVE-2022-25236</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236</a><br><a href="https://github.com/libexpat/libexpat/pull/561">https://github.com/libexpat/libexpat/pull/561</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)">https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)</a><br><a href="https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)">https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)</a><br><a href="https://github.com/libexpat/libexpat/pull/577">https://github.com/libexpat/libexpat/pull/577</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25236.html">https://linux.oracle.com/cve/CVE-2022-25236.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9359.html">https://linux.oracle.com/errata/ELSA-2022-9359.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">https://nvd.nist.gov/vuln/detail/CVE-2022-25236</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| expat | CVE-2022-25315 | CRITICAL | 2.2.9-r1 | 2.2.10-r2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25315">https://access.redhat.com/security/cve/CVE-2022-25315</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315</a><br><a href="https://github.com/libexpat/libexpat/pull/559">https://github.com/libexpat/libexpat/pull/559</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25315.html">https://linux.oracle.com/cve/CVE-2022-25315.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9359.html">https://linux.oracle.com/errata/ELSA-2022-9359.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">https://nvd.nist.gov/vuln/detail/CVE-2022-25315</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| expat | CVE-2021-45960 | HIGH | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-45960">https://access.redhat.com/security/cve/CVE-2021-45960</a><br><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1217609">https://bugzilla.mozilla.org/show_bug.cgi?id=1217609</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960</a><br><a href="https://github.com/libexpat/libexpat/issues/531">https://github.com/libexpat/libexpat/issues/531</a><br><a href="https://github.com/libexpat/libexpat/pull/534">https://github.com/libexpat/libexpat/pull/534</a><br><a href="https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea">https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea</a><br><a href="https://linux.oracle.com/cve/CVE-2021-45960.html">https://linux.oracle.com/cve/CVE-2021-45960.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">https://nvd.nist.gov/vuln/detail/CVE-2021-45960</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0004/">https://security.netapp.com/advisory/ntap-20220121-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2021-46143 | HIGH | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-46143">https://access.redhat.com/security/cve/CVE-2021-46143</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143</a><br><a href="https://github.com/libexpat/libexpat/issues/532">https://github.com/libexpat/libexpat/issues/532</a><br><a href="https://github.com/libexpat/libexpat/pull/538">https://github.com/libexpat/libexpat/pull/538</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46143.html">https://linux.oracle.com/cve/CVE-2021-46143.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9227.html">https://linux.oracle.com/errata/ELSA-2022-9227.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">https://nvd.nist.gov/vuln/detail/CVE-2021-46143</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0006/">https://security.netapp.com/advisory/ntap-20220121-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-22825 | HIGH | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22825">https://access.redhat.com/security/cve/CVE-2022-22825</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22825.html">https://linux.oracle.com/cve/CVE-2022-22825.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">https://nvd.nist.gov/vuln/detail/CVE-2022-22825</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-22826 | HIGH | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22826">https://access.redhat.com/security/cve/CVE-2022-22826</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22826.html">https://linux.oracle.com/cve/CVE-2022-22826.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">https://nvd.nist.gov/vuln/detail/CVE-2022-22826</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-22827 | HIGH | 2.2.9-r1 | 2.2.10-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/17/3">http://www.openwall.com/lists/oss-security/2022/01/17/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-22827">https://access.redhat.com/security/cve/CVE-2022-22827</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827</a><br><a href="https://github.com/libexpat/libexpat/pull/539">https://github.com/libexpat/libexpat/pull/539</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22827.html">https://linux.oracle.com/cve/CVE-2022-22827.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1069.html">https://linux.oracle.com/errata/ELSA-2022-1069.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">https://nvd.nist.gov/vuln/detail/CVE-2022-22827</a><br><a href="https://ubuntu.com/security/notices/USN-5288-1">https://ubuntu.com/security/notices/USN-5288-1</a><br><a href="https://www.debian.org/security/2022/dsa-5073">https://www.debian.org/security/2022/dsa-5073</a><br><a href="https://www.tenable.com/security/tns-2022-05">https://www.tenable.com/security/tns-2022-05</a><br></details> |
|
||
| expat | CVE-2022-25314 | HIGH | 2.2.9-r1 | 2.2.10-r2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25314">https://access.redhat.com/security/cve/CVE-2022-25314</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314</a><br><a href="https://github.com/libexpat/libexpat/pull/560">https://github.com/libexpat/libexpat/pull/560</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25314.html">https://linux.oracle.com/cve/CVE-2022-25314.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5314.html">https://linux.oracle.com/errata/ELSA-2022-5314.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">https://nvd.nist.gov/vuln/detail/CVE-2022-25314</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| expat | CVE-2022-25313 | MEDIUM | 2.2.9-r1 | 2.2.10-r2 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/02/19/1">http://www.openwall.com/lists/oss-security/2022/02/19/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-25313">https://access.redhat.com/security/cve/CVE-2022-25313</a><br><a href="https://blog.hartwork.org/posts/expat-2-4-5-released/">https://blog.hartwork.org/posts/expat-2-4-5-released/</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313</a><br><a href="https://github.com/libexpat/libexpat/pull/558">https://github.com/libexpat/libexpat/pull/558</a><br><a href="https://linux.oracle.com/cve/CVE-2022-25313.html">https://linux.oracle.com/cve/CVE-2022-25313.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5314.html">https://linux.oracle.com/errata/ELSA-2022-5314.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">https://nvd.nist.gov/vuln/detail/CVE-2022-25313</a><br><a href="https://security.netapp.com/advisory/ntap-20220303-0008/">https://security.netapp.com/advisory/ntap-20220303-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5320-1">https://ubuntu.com/security/notices/USN-5320-1</a><br><a href="https://www.debian.org/security/2022/dsa-5085">https://www.debian.org/security/2022/dsa-5085</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| freetype | CVE-2022-27404 | CRITICAL | 2.10.4-r0 | 2.10.4-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27404">https://access.redhat.com/security/cve/CVE-2022-27404</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404</a><br><a href="https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db">https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db</a><br><a href="https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138">https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</a><br></details> |
|
||
| freetype | CVE-2022-27405 | HIGH | 2.10.4-r0 | 2.10.4-r2 | <details><summary>Expand...</summary><a href="http://freetype.com">http://freetype.com</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-27405">https://access.redhat.com/security/cve/CVE-2022-27405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405</a><br><a href="https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5">https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5</a><br><a href="https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139">https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">https://nvd.nist.gov/vuln/detail/CVE-2022-27405</a><br></details> |
|
||
| freetype | CVE-2022-27406 | HIGH | 2.10.4-r0 | 2.10.4-r2 | <details><summary>Expand...</summary><a href="http://freetype.com">http://freetype.com</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-27406">https://access.redhat.com/security/cve/CVE-2022-27406</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406</a><br><a href="https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2">https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2</a><br><a href="https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140">https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</a><br><a href="https://ubuntu.com/security/notices/USN-5453-1">https://ubuntu.com/security/notices/USN-5453-1</a><br></details> |
|
||
| gdk-pixbuf | CVE-2020-29385 | MEDIUM | 2.40.0-r3 | 2.40.0-r4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-29385">https://access.redhat.com/security/cve/CVE-2020-29385</a><br><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977166">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385</a><br><a href="https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/blob/master/NEWS">https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/blob/master/NEWS</a><br><a href="https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/164">https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/164</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5H3GNVWMZTYZR3JBYCK57PF7PFMQBNP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5H3GNVWMZTYZR3JBYCK57PF7PFMQBNP/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGZVCTH5O7WBJLYXZ2UOKLYNIFPVR55D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGZVCTH5O7WBJLYXZ2UOKLYNIFPVR55D/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EANWYODLOJDFLMBH6WEKJJMQ5PKLEWML/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EANWYODLOJDFLMBH6WEKJJMQ5PKLEWML/</a><br><a href="https://mail.gnome.org/archives/distributor-list/2020-December/msg00000.html">https://mail.gnome.org/archives/distributor-list/2020-December/msg00000.html</a><br><a href="https://security.gentoo.org/glsa/202012-15">https://security.gentoo.org/glsa/202012-15</a><br><a href="https://ubuntu.com/security/CVE-2020-29385">https://ubuntu.com/security/CVE-2020-29385</a><br><a href="https://ubuntu.com/security/notices/USN-4663-1">https://ubuntu.com/security/notices/USN-4663-1</a><br></details> |
|
||
| ghostscript | CVE-2020-15900 | CRITICAL | 9.52-r0 | 9.52-r1 | <details><summary>Expand...</summary><a href="http://git.ghostscript.com/?p=ghostpdl.git;a=log">http://git.ghostscript.com/?p=ghostpdl.git;a=log</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html">http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-15900">https://access.redhat.com/security/cve/CVE-2020-15900</a><br><a href="https://artifex.com/security-advisories/CVE-2020-15900">https://artifex.com/security-advisories/CVE-2020-15900</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900</a><br><a href="https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5d499272b95a6b890a1397e11d20937de000d31b">https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5d499272b95a6b890a1397e11d20937de000d31b</a><br><a href="https://github.com/ArtifexSoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b">https://github.com/ArtifexSoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b</a><br><a href="https://github.com/ArtifexSoftware/ghostpdl/commits/master/psi/zstring.c">https://github.com/ArtifexSoftware/ghostpdl/commits/master/psi/zstring.c</a><br><a href="https://security.gentoo.org/glsa/202008-20">https://security.gentoo.org/glsa/202008-20</a><br><a href="https://ubuntu.com/security/notices/USN-4445-1">https://ubuntu.com/security/notices/USN-4445-1</a><br><a href="https://usn.ubuntu.com/4445-1/">https://usn.ubuntu.com/4445-1/</a><br></details> |
|
||
| git | CVE-2021-40330 | HIGH | 2.26.3-r0 | 2.26.3-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-40330">https://access.redhat.com/security/cve/CVE-2021-40330</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330</a><br><a href="https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473">https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473</a><br><a href="https://github.com/git/git/compare/v2.30.0...v2.30.1">https://github.com/git/git/compare/v2.30.0...v2.30.1</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">https://nvd.nist.gov/vuln/detail/CVE-2021-40330</a><br><a href="https://ubuntu.com/security/notices/USN-5076-1">https://ubuntu.com/security/notices/USN-5076-1</a><br></details> |
|
||
| gmp | CVE-2021-43618 | HIGH | 6.2.0-r0 | 6.2.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
|
||
| libblkid | CVE-2021-3995 | MEDIUM | 2.35.2-r0 | 2.37.3-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3995">https://access.redhat.com/security/cve/CVE-2021-3995</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href="https://ubuntu.com/security/notices/USN-5279-1">https://ubuntu.com/security/notices/USN-5279-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/2">https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details> |
|
||
| libblkid | CVE-2021-3996 | MEDIUM | 2.35.2-r0 | 2.37.3-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3996">https://access.redhat.com/security/cve/CVE-2021-3996</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href="https://ubuntu.com/security/notices/USN-5279-1">https://ubuntu.com/security/notices/USN-5279-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/2">https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details> |
|
||
| libblkid | CVE-2022-0563 | MEDIUM | 2.35.2-r0 | 2.37.4-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
|
||
| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3711">https://access.redhat.com/security/cve/CVE-2021-3711</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">https://nvd.nist.gov/vuln/detail/CVE-2021-3711</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0097.html">https://rustsec.org/advisories/RUSTSEC-2021-0097.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
|
||
| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10366">https://kc.mcafee.com/corporate/index?page=content&id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
|
||
| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html">http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html</a><br><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1065.html">https://errata.almalinux.org/8/ALSA-2022-1065.html</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9272.html">https://linux.oracle.com/errata/ELSA-2022-9272.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://security.netapp.com/advisory/ntap-20220429-0005/">https://security.netapp.com/advisory/ntap-20220429-0005/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br><a href="https://www.tenable.com/security/tns-2022-07">https://www.tenable.com/security/tns-2022-07</a><br><a href="https://www.tenable.com/security/tns-2022-08">https://www.tenable.com/security/tns-2022-08</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| libcurl | CVE-2021-22945 | CRITICAL | 7.76.1-r0 | 7.79.0-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22945">https://access.redhat.com/security/cve/CVE-2021-22945</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22945.html">https://curl.se/docs/CVE-2021-22945.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945</a><br><a href="https://hackerone.com/reports/1269242">https://hackerone.com/reports/1269242</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">https://nvd.nist.gov/vuln/detail/CVE-2021-22945</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libcurl | CVE-2021-22901 | HIGH | 7.76.1-r0 | 7.77.0-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22901">https://access.redhat.com/security/cve/CVE-2021-22901</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22901.html">https://curl.se/docs/CVE-2021-22901.html</a><br><a href="https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479">https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479</a><br><a href="https://hackerone.com/reports/1180380">https://hackerone.com/reports/1180380</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22901">https://nvd.nist.gov/vuln/detail/CVE-2021-22901</a><br><a href="https://security.netapp.com/advisory/ntap-20210723-0001/">https://security.netapp.com/advisory/ntap-20210723-0001/</a><br><a href="https://security.netapp.com/advisory/ntap-20210727-0007/">https://security.netapp.com/advisory/ntap-20210727-0007/</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| libcurl | CVE-2021-22946 | HIGH | 7.76.1-r0 | 7.79.0-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22946">https://access.redhat.com/security/cve/CVE-2021-22946</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22946.html">https://curl.se/docs/CVE-2021-22946.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946</a><br><a href="https://hackerone.com/reports/1334111">https://hackerone.com/reports/1334111</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22946.html">https://linux.oracle.com/cve/CVE-2021-22946.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">https://nvd.nist.gov/vuln/detail/CVE-2021-22946</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20220121-0008/">https://security.netapp.com/advisory/ntap-20220121-0008/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libcurl | CVE-2022-22576 | HIGH | 7.76.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://hackerone.com/reports/1526328">https://hackerone.com/reports/1526328</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22576.html">https://linux.oracle.com/cve/CVE-2022-22576.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">https://nvd.nist.gov/vuln/detail/CVE-2022-22576</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
|
||
| libcurl | CVE-2022-27775 | HIGH | 7.76.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://hackerone.com/reports/1546268">https://hackerone.com/reports/1546268</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">https://nvd.nist.gov/vuln/detail/CVE-2022-27775</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
|
||
| libcurl | CVE-2021-22922 | MEDIUM | 7.76.1-r0 | 7.78.0-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22922">https://access.redhat.com/security/cve/CVE-2021-22922</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22922.html">https://curl.se/docs/CVE-2021-22922.html</a><br><a href="https://hackerone.com/reports/1213175">https://hackerone.com/reports/1213175</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22922.html">https://linux.oracle.com/cve/CVE-2021-22922.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">https://nvd.nist.gov/vuln/detail/CVE-2021-22922</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libcurl | CVE-2021-22923 | MEDIUM | 7.76.1-r0 | 7.78.0-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22923">https://access.redhat.com/security/cve/CVE-2021-22923</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22923.html">https://curl.se/docs/CVE-2021-22923.html</a><br><a href="https://hackerone.com/reports/1213181">https://hackerone.com/reports/1213181</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22923.html">https://linux.oracle.com/cve/CVE-2021-22923.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">https://nvd.nist.gov/vuln/detail/CVE-2021-22923</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libcurl | CVE-2021-22925 | MEDIUM | 7.76.1-r0 | 7.78.0-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Sep/39">http://seclists.org/fulldisclosure/2021/Sep/39</a><br><a href="http://seclists.org/fulldisclosure/2021/Sep/40">http://seclists.org/fulldisclosure/2021/Sep/40</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22925">https://access.redhat.com/security/cve/CVE-2021-22925</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22925.html">https://curl.se/docs/CVE-2021-22925.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4511.html">https://errata.almalinux.org/8/ALSA-2021-4511.html</a><br><a href="https://hackerone.com/reports/1223882">https://hackerone.com/reports/1223882</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22925.html">https://linux.oracle.com/cve/CVE-2021-22925.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">https://nvd.nist.gov/vuln/detail/CVE-2021-22925</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://support.apple.com/kb/HT212804">https://support.apple.com/kb/HT212804</a><br><a href="https://support.apple.com/kb/HT212805">https://support.apple.com/kb/HT212805</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libcurl | CVE-2021-22947 | MEDIUM | 7.76.1-r0 | 7.79.0-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22947">https://access.redhat.com/security/cve/CVE-2021-22947</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22947.html">https://curl.se/docs/CVE-2021-22947.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947</a><br><a href="https://hackerone.com/reports/1334763">https://hackerone.com/reports/1334763</a><br><a href="https://launchpad.net/bugs/1944120 (regression bug)">https://launchpad.net/bugs/1944120 (regression bug)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22947.html">https://linux.oracle.com/cve/CVE-2021-22947.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4059.html">https://linux.oracle.com/errata/ELSA-2021-4059.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">https://nvd.nist.gov/vuln/detail/CVE-2021-22947</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0003/">https://security.netapp.com/advisory/ntap-20211029-0003/</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://ubuntu.com/security/notices/USN-5079-1">https://ubuntu.com/security/notices/USN-5079-1</a><br><a href="https://ubuntu.com/security/notices/USN-5079-2">https://ubuntu.com/security/notices/USN-5079-2</a><br><a href="https://ubuntu.com/security/notices/USN-5079-3">https://ubuntu.com/security/notices/USN-5079-3</a><br><a href="https://ubuntu.com/security/notices/USN-5079-4">https://ubuntu.com/security/notices/USN-5079-4</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libcurl | CVE-2022-27774 | MEDIUM | 7.76.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://hackerone.com/reports/1543773">https://hackerone.com/reports/1543773</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27774.html">https://linux.oracle.com/cve/CVE-2022-27774.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">https://nvd.nist.gov/vuln/detail/CVE-2022-27774</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
|
||
| libcurl | CVE-2022-27776 | MEDIUM | 7.76.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://hackerone.com/reports/1547048">https://hackerone.com/reports/1547048</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27776.html">https://linux.oracle.com/cve/CVE-2022-27776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">https://nvd.nist.gov/vuln/detail/CVE-2022-27776</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
|
||
| libcurl | CVE-2021-22898 | LOW | 7.76.1-r0 | 7.77.0-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/07/21/4">http://www.openwall.com/lists/oss-security/2021/07/21/4</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-22898">https://access.redhat.com/security/cve/CVE-2021-22898</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22898.html">https://curl.se/docs/CVE-2021-22898.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-4511.html">https://errata.almalinux.org/8/ALSA-2021-4511.html</a><br><a href="https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde">https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde</a><br><a href="https://hackerone.com/reports/1176461">https://hackerone.com/reports/1176461</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22898.html">https://linux.oracle.com/cve/CVE-2021-22898.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4511.html">https://linux.oracle.com/errata/ELSA-2021-4511.html</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">https://nvd.nist.gov/vuln/detail/CVE-2021-22898</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://ubuntu.com/security/notices/USN-5021-2">https://ubuntu.com/security/notices/USN-5021-2</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| libcurl | CVE-2021-22924 | LOW | 7.76.1-r0 | 7.78.0-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-22924">https://access.redhat.com/security/cve/CVE-2021-22924</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf</a><br><a href="https://curl.se/docs/CVE-2021-22924.html">https://curl.se/docs/CVE-2021-22924.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924</a><br><a href="https://hackerone.com/reports/1223565">https://hackerone.com/reports/1223565</a><br><a href="https://linux.oracle.com/cve/CVE-2021-22924.html">https://linux.oracle.com/cve/CVE-2021-22924.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3582.html">https://linux.oracle.com/errata/ELSA-2021-3582.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html">https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">https://nvd.nist.gov/vuln/detail/CVE-2021-22924</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0003/">https://security.netapp.com/advisory/ntap-20210902-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5021-1">https://ubuntu.com/security/notices/USN-5021-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libmount | CVE-2021-3995 | MEDIUM | 2.35.2-r0 | 2.37.3-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3995">https://access.redhat.com/security/cve/CVE-2021-3995</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href="https://ubuntu.com/security/notices/USN-5279-1">https://ubuntu.com/security/notices/USN-5279-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/2">https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details> |
|
||
| libmount | CVE-2021-3996 | MEDIUM | 2.35.2-r0 | 2.37.3-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3996">https://access.redhat.com/security/cve/CVE-2021-3996</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href="https://ubuntu.com/security/notices/USN-5279-1">https://ubuntu.com/security/notices/USN-5279-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/2">https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details> |
|
||
| libmount | CVE-2022-0563 | MEDIUM | 2.35.2-r0 | 2.37.4-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
|
||
| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3711">https://access.redhat.com/security/cve/CVE-2021-3711</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">https://nvd.nist.gov/vuln/detail/CVE-2021-3711</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0097.html">https://rustsec.org/advisories/RUSTSEC-2021-0097.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
|
||
| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10366">https://kc.mcafee.com/corporate/index?page=content&id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
|
||
| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html">http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html</a><br><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1065.html">https://errata.almalinux.org/8/ALSA-2022-1065.html</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9272.html">https://linux.oracle.com/errata/ELSA-2022-9272.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://security.netapp.com/advisory/ntap-20220429-0005/">https://security.netapp.com/advisory/ntap-20220429-0005/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br><a href="https://www.tenable.com/security/tns-2022-07">https://www.tenable.com/security/tns-2022-07</a><br><a href="https://www.tenable.com/security/tns-2022-08">https://www.tenable.com/security/tns-2022-08</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| libuuid | CVE-2021-3995 | MEDIUM | 2.35.2-r0 | 2.37.3-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3995">https://access.redhat.com/security/cve/CVE-2021-3995</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995</a><br><a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href="https://ubuntu.com/security/notices/USN-5279-1">https://ubuntu.com/security/notices/USN-5279-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/2">https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details> |
|
||
| libuuid | CVE-2021-3996 | MEDIUM | 2.35.2-r0 | 2.37.3-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3996">https://access.redhat.com/security/cve/CVE-2021-3996</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996</a><br><a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes</a><br><a href="https://ubuntu.com/security/notices/USN-5279-1">https://ubuntu.com/security/notices/USN-5279-1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/01/24/2">https://www.openwall.com/lists/oss-security/2022/01/24/2</a><br></details> |
|
||
| libuuid | CVE-2022-0563 | MEDIUM | 2.35.2-r0 | 2.37.4-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a><br><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a><br></details> |
|
||
| libx11 | CVE-2021-31535 | CRITICAL | 1.6.12-r0 | 1.6.12-r1 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html">http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html</a><br><a href="http://seclists.org/fulldisclosure/2021/May/52">http://seclists.org/fulldisclosure/2021/May/52</a><br><a href="http://www.openwall.com/lists/oss-security/2021/05/18/2">http://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-31535">https://access.redhat.com/security/cve/CVE-2021-31535</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535</a><br><a href="https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605">https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605</a><br><a href="https://linux.oracle.com/cve/CVE-2021-31535.html">https://linux.oracle.com/cve/CVE-2021-31535.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4326.html">https://linux.oracle.com/errata/ELSA-2021-4326.html</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/</a><br><a href="https://lists.freedesktop.org/archives/xorg/">https://lists.freedesktop.org/archives/xorg/</a><br><a href="https://lists.x.org/archives/xorg-announce/2021-May/003088.html">https://lists.x.org/archives/xorg-announce/2021-May/003088.html</a><br><a href="https://security.gentoo.org/glsa/202105-16">https://security.gentoo.org/glsa/202105-16</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0001/">https://security.netapp.com/advisory/ntap-20210813-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4966-1">https://ubuntu.com/security/notices/USN-4966-1</a><br><a href="https://ubuntu.com/security/notices/USN-4966-2">https://ubuntu.com/security/notices/USN-4966-2</a><br><a href="https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/">https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/</a><br><a href="https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt">https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt</a><br><a href="https://www.debian.org/security/2021/dsa-4920">https://www.debian.org/security/2021/dsa-4920</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/2">https://www.openwall.com/lists/oss-security/2021/05/18/2</a><br><a href="https://www.openwall.com/lists/oss-security/2021/05/18/3">https://www.openwall.com/lists/oss-security/2021/05/18/3</a><br></details> |
|
||
| libxml2 | CVE-2021-3517 | HIGH | 2.9.10-r5 | 2.9.10-r6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3517">https://access.redhat.com/security/cve/CVE-2021-3517</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954232">https://bugzilla.redhat.com/show_bug.cgi?id=1954232</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2">https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/235">https://gitlab.gnome.org/GNOME/libxml2/-/issues/235</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3517.html">https://linux.oracle.com/cve/CVE-2021-3517.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">https://nvd.nist.gov/vuln/detail/CVE-2021-3517</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0004/">https://security.netapp.com/advisory/ntap-20211022-0004/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libxml2 | CVE-2021-3518 | HIGH | 2.9.10-r5 | 2.9.10-r6 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2021/Jul/54">http://seclists.org/fulldisclosure/2021/Jul/54</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/55">http://seclists.org/fulldisclosure/2021/Jul/55</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/58">http://seclists.org/fulldisclosure/2021/Jul/58</a><br><a href="http://seclists.org/fulldisclosure/2021/Jul/59">http://seclists.org/fulldisclosure/2021/Jul/59</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3518">https://access.redhat.com/security/cve/CVE-2021-3518</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1954242">https://bugzilla.redhat.com/show_bug.cgi?id=1954242</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7">https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/237">https://gitlab.gnome.org/GNOME/libxml2/-/issues/237</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3518.html">https://linux.oracle.com/cve/CVE-2021-3518.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">https://nvd.nist.gov/vuln/detail/CVE-2021-3518</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://support.apple.com/kb/HT212601">https://support.apple.com/kb/HT212601</a><br><a href="https://support.apple.com/kb/HT212602">https://support.apple.com/kb/HT212602</a><br><a href="https://support.apple.com/kb/HT212604">https://support.apple.com/kb/HT212604</a><br><a href="https://support.apple.com/kb/HT212605">https://support.apple.com/kb/HT212605</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libxml2 | CVE-2022-23308 | HIGH | 2.9.10-r5 | 2.9.13-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/34">http://seclists.org/fulldisclosure/2022/May/34</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/36">http://seclists.org/fulldisclosure/2022/May/36</a><br><a href="http://seclists.org/fulldisclosure/2022/May/37">http://seclists.org/fulldisclosure/2022/May/37</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-23308">https://access.redhat.com/security/cve/CVE-2022-23308</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308</a><br><a href="https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e">https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS">https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS</a><br><a href="https://linux.oracle.com/cve/CVE-2022-23308.html">https://linux.oracle.com/cve/CVE-2022-23308.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0899.html">https://linux.oracle.com/errata/ELSA-2022-0899.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">https://nvd.nist.gov/vuln/detail/CVE-2022-23308</a><br><a href="https://security.netapp.com/advisory/ntap-20220331-0008/">https://security.netapp.com/advisory/ntap-20220331-0008/</a><br><a href="https://support.apple.com/kb/HT213253">https://support.apple.com/kb/HT213253</a><br><a href="https://support.apple.com/kb/HT213254">https://support.apple.com/kb/HT213254</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://support.apple.com/kb/HT213258">https://support.apple.com/kb/HT213258</a><br><a href="https://ubuntu.com/security/notices/USN-5324-1">https://ubuntu.com/security/notices/USN-5324-1</a><br><a href="https://ubuntu.com/security/notices/USN-5422-1">https://ubuntu.com/security/notices/USN-5422-1</a><br></details> |
|
||
| libxml2 | CVE-2021-3537 | MEDIUM | 2.9.10-r5 | 2.9.10-r6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3537">https://access.redhat.com/security/cve/CVE-2021-3537</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1956522">https://bugzilla.redhat.com/show_bug.cgi?id=1956522</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61">https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/243">https://gitlab.gnome.org/GNOME/libxml2/-/issues/243</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/244">https://gitlab.gnome.org/GNOME/libxml2/-/issues/244</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/245">https://gitlab.gnome.org/GNOME/libxml2/-/issues/245</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3537.html">https://linux.oracle.com/cve/CVE-2021-3537.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">https://nvd.nist.gov/vuln/detail/CVE-2021-3537</a><br><a href="https://security.gentoo.org/glsa/202107-05">https://security.gentoo.org/glsa/202107-05</a><br><a href="https://security.netapp.com/advisory/ntap-20210625-0002/">https://security.netapp.com/advisory/ntap-20210625-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| libxml2 | CVE-2021-3541 | MEDIUM | 2.9.10-r5 | 2.9.12-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3541">https://access.redhat.com/security/cve/CVE-2021-3541</a><br><a href="https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/">https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1950515">https://bugzilla.redhat.com/show_bug.cgi?id=1950515</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e">https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)">https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3541.html">https://linux.oracle.com/cve/CVE-2021-3541.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-2569.html">https://linux.oracle.com/errata/ELSA-2021-2569.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210805-0007/">https://security.netapp.com/advisory/ntap-20210805-0007/</a><br><a href="https://ubuntu.com/security/notices/USN-4991-1">https://ubuntu.com/security/notices/USN-4991-1</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10-r5 | 2.9.14-r0 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html">http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-29824">https://access.redhat.com/security/cve/CVE-2022-29824</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab">https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)">https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd">https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)">https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)</a><br><a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14">https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14</a><br><a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags">https://gitlab.gnome.org/GNOME/libxslt/-/tags</a><br><a href="https://linux.oracle.com/cve/CVE-2022-29824.html">https://linux.oracle.com/cve/CVE-2022-29824.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5317.html">https://linux.oracle.com/errata/ELSA-2022-5317.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/</a><br><a href="https://ubuntu.com/security/notices/USN-5422-1">https://ubuntu.com/security/notices/USN-5422-1</a><br><a href="https://www.debian.org/security/2022/dsa-5142">https://www.debian.org/security/2022/dsa-5142</a><br></details> |
|
||
| ncurses-libs | CVE-2021-39537 | HIGH | 6.2_p20200523-r0 | 6.2_p20200523-r1 | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| ncurses-terminfo-base | CVE-2021-39537 | HIGH | 6.2_p20200523-r0 | 6.2_p20200523-r1 | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
|
||
| nettle | CVE-2021-3580 | HIGH | 3.5.1-r1 | 3.5.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3580">https://access.redhat.com/security/cve/CVE-2021-3580</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1967983">https://bugzilla.redhat.com/show_bug.cgi?id=1967983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3580.html">https://linux.oracle.com/cve/CVE-2021-3580.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9221.html">https://linux.oracle.com/errata/ELSA-2022-9221.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">https://nvd.nist.gov/vuln/detail/CVE-2021-3580</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0006/">https://security.netapp.com/advisory/ntap-20211104-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4990-1">https://ubuntu.com/security/notices/USN-4990-1</a><br></details> |
|
||
| nginx | CVE-2021-23017 | CRITICAL | 1.18.0-r1 | 1.18.0-r2 | <details><summary>Expand...</summary><a href="http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html">http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23017">https://access.redhat.com/security/cve/CVE-2021-23017</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23017.html">https://linux.oracle.com/cve/CVE-2021-23017.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0323.html">https://linux.oracle.com/errata/ELSA-2022-0323.html</a><br><a href="https://lists.apache.org/thread.html/r37e6b2165f7c910d8e15fd54f4697857619ad2625f56583802004009@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r37e6b2165f7c910d8e15fd54f4697857619ad2625f56583802004009@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4d4966221ca399ce948ef34884652265729d7d9ef8179c78d7f17e7f@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r4d4966221ca399ce948ef34884652265729d7d9ef8179c78d7f17e7f@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r6fc5c57b38e93e36213e9a18c8a4e5dbd5ced1c7e57f08a1735975ba@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/r6fc5c57b38e93e36213e9a18c8a4e5dbd5ced1c7e57f08a1735975ba@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf232eecd47fdc44520192810560303073cefd684b321f85e311bad31@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/rf232eecd47fdc44520192810560303073cefd684b321f85e311bad31@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf318aeeb4d7a3a312734780b47de83cefb7e6995da0b2cae5c28675c@%3Cnotifications.apisix.apache.org%3E">https://lists.apache.org/thread.html/rf318aeeb4d7a3a312734780b47de83cefb7e6995da0b2cae5c28675c@%3Cnotifications.apisix.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SFVYHC7OXTEO4SMBWXDVK6E5IMEYMEE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SFVYHC7OXTEO4SMBWXDVK6E5IMEYMEE/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNKOP2JR5L7KCIZTJRZDCUPJTUONMC5I/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNKOP2JR5L7KCIZTJRZDCUPJTUONMC5I/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23017">https://nvd.nist.gov/vuln/detail/CVE-2021-23017</a><br><a href="https://security.netapp.com/advisory/ntap-20210708-0006/">https://security.netapp.com/advisory/ntap-20210708-0006/</a><br><a href="https://support.f5.com/csp/article/K12331123,">https://support.f5.com/csp/article/K12331123,</a><br><a href="https://ubuntu.com/security/notices/USN-4967-1">https://ubuntu.com/security/notices/USN-4967-1</a><br><a href="https://ubuntu.com/security/notices/USN-4967-2">https://ubuntu.com/security/notices/USN-4967-2</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/">https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/</a><br></details> |
|
||
| openssl | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3711">https://access.redhat.com/security/cve/CVE-2021-3711</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">https://nvd.nist.gov/vuln/detail/CVE-2021-3711</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0097.html">https://rustsec.org/advisories/RUSTSEC-2021-0097.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
|
||
| openssl | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/08/26/2">http://www.openwall.com/lists/oss-security/2021/08/26/2</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3712">https://access.redhat.com/security/cve/CVE-2021-3712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12</a><br><a href="https://kc.mcafee.com/corporate/index?page=content&id=SB10366">https://kc.mcafee.com/corporate/index?page=content&id=SB10366</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3712.html">https://linux.oracle.com/cve/CVE-2021-3712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9023.html">https://linux.oracle.com/errata/ELSA-2022-9023.html</a><br><a href="https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E">https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">https://nvd.nist.gov/vuln/detail/CVE-2021-3712</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2021-0098.html">https://rustsec.org/advisories/RUSTSEC-2021-0098.html</a><br><a href="https://security.netapp.com/advisory/ntap-20210827-0010/">https://security.netapp.com/advisory/ntap-20210827-0010/</a><br><a href="https://ubuntu.com/security/notices/USN-5051-1">https://ubuntu.com/security/notices/USN-5051-1</a><br><a href="https://ubuntu.com/security/notices/USN-5051-2">https://ubuntu.com/security/notices/USN-5051-2</a><br><a href="https://ubuntu.com/security/notices/USN-5051-3">https://ubuntu.com/security/notices/USN-5051-3</a><br><a href="https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)">https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)</a><br><a href="https://ubuntu.com/security/notices/USN-5088-1">https://ubuntu.com/security/notices/USN-5088-1</a><br><a href="https://www.debian.org/security/2021/dsa-4963">https://www.debian.org/security/2021/dsa-4963</a><br><a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br><a href="https://www.tenable.com/security/tns-2021-16">https://www.tenable.com/security/tns-2021-16</a><br><a href="https://www.tenable.com/security/tns-2022-02">https://www.tenable.com/security/tns-2022-02</a><br></details> |
|
||
| openssl | CVE-2022-0778 | HIGH | 1.1.1k-r0 | 1.1.1n-r0 | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html">http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html</a><br><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0778">https://access.redhat.com/security/cve/CVE-2022-0778</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf</a><br><a href="https://crates.io/crates/openssl-src">https://crates.io/crates/openssl-src</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1065.html">https://errata.almalinux.org/8/ALSA-2022-1065.html</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0778.html">https://linux.oracle.com/cve/CVE-2022-0778.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-9272.html">https://linux.oracle.com/errata/ELSA-2022-9272.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">https://nvd.nist.gov/vuln/detail/CVE-2022-0778</a><br><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002</a><br><a href="https://rustsec.org/advisories/RUSTSEC-2022-0014.html">https://rustsec.org/advisories/RUSTSEC-2022-0014.html</a><br><a href="https://security.netapp.com/advisory/ntap-20220321-0002/">https://security.netapp.com/advisory/ntap-20220321-0002/</a><br><a href="https://security.netapp.com/advisory/ntap-20220429-0005/">https://security.netapp.com/advisory/ntap-20220429-0005/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5328-1">https://ubuntu.com/security/notices/USN-5328-1</a><br><a href="https://ubuntu.com/security/notices/USN-5328-2">https://ubuntu.com/security/notices/USN-5328-2</a><br><a href="https://www.debian.org/security/2022/dsa-5103">https://www.debian.org/security/2022/dsa-5103</a><br><a href="https://www.openssl.org/news/secadv/20220315.txt">https://www.openssl.org/news/secadv/20220315.txt</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.tenable.com/security/tns-2022-06">https://www.tenable.com/security/tns-2022-06</a><br><a href="https://www.tenable.com/security/tns-2022-07">https://www.tenable.com/security/tns-2022-07</a><br><a href="https://www.tenable.com/security/tns-2022-08">https://www.tenable.com/security/tns-2022-08</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7 | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7 | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7 | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7 | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-common | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-common | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-common | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-common | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-ctype | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-ctype | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-ctype | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-ctype | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-curl | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-curl | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-curl | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-curl | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-dom | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-dom | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-dom | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-dom | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-exif | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-exif | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-exif | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-exif | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-fileinfo | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-fileinfo | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-fileinfo | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-fileinfo | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-fpm | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-fpm | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-fpm | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-fpm | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-iconv | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-iconv | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-iconv | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-iconv | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-intl | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-intl | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-intl | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-intl | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-json | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-json | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-json | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-json | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-mbstring | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-mbstring | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-mbstring | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-mbstring | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-openssl | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-openssl | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-openssl | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-openssl | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-phar | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-phar | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-phar | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-phar | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-session | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-session | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-session | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-session | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-simplexml | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-simplexml | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-simplexml | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-simplexml | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-xml | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-xml | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-xml | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-xml | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| php7-xmlwriter | CVE-2021-21703 | HIGH | 7.3.27-r0 | 7.3.32-r0 | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/26/7">http://www.openwall.com/lists/oss-security/2021/10/26/7</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-21703">https://access.redhat.com/security/cve/CVE-2021-21703</a><br><a href="https://bugs.php.net/bug.php?id=81026">https://bugs.php.net/bug.php?id=81026</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b">https://github.com/php/php-src/commit/fadb1f8c1d08ae62b4f0a16917040fde57a3b93b</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21703.html">https://linux.oracle.com/cve/CVE-2021-21703.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html">https://lists.debian.org/debian-lts-announce/2021/10/msg00021.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PZVLICZUJMXOGWOUWSBAEGIVTF6Y6V3/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO5RA6YOBGGGKLIA6F6BQRZDDECF5L3R/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBM3KKB3RY2YPOKNMC4HIH7IH3T3WC74/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">https://nvd.nist.gov/vuln/detail/CVE-2021-21703</a><br><a href="https://security.netapp.com/advisory/ntap-20211118-0003/">https://security.netapp.com/advisory/ntap-20211118-0003/</a><br><a href="https://ubuntu.com/security/notices/USN-5125-1">https://ubuntu.com/security/notices/USN-5125-1</a><br><a href="https://www.ambionics.io/blog/php-fpm-local-root">https://www.ambionics.io/blog/php-fpm-local-root</a><br><a href="https://www.debian.org/security/2021/dsa-4992">https://www.debian.org/security/2021/dsa-4992</a><br><a href="https://www.debian.org/security/2021/dsa-4993">https://www.debian.org/security/2021/dsa-4993</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-xmlwriter | CVE-2021-21705 | MEDIUM | 7.3.27-r0 | 7.3.29-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21705">https://access.redhat.com/security/cve/CVE-2021-21705</a><br><a href="https://bugs.php.net/bug.php?id=81122">https://bugs.php.net/bug.php?id=81122</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1935.html">https://errata.almalinux.org/8/ALSA-2022-1935.html</a><br><a href="https://linux.oracle.com/cve/CVE-2021-21705.html">https://linux.oracle.com/cve/CVE-2021-21705.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1935.html">https://linux.oracle.com/errata/ELSA-2022-1935.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">https://nvd.nist.gov/vuln/detail/CVE-2021-21705</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0006/">https://security.netapp.com/advisory/ntap-20211029-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-5006-1">https://ubuntu.com/security/notices/USN-5006-1</a><br><a href="https://ubuntu.com/security/notices/USN-5006-2">https://ubuntu.com/security/notices/USN-5006-2</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| php7-xmlwriter | CVE-2021-21706 | MEDIUM | 7.3.27-r0 | 7.3.31-r0 | <details><summary>Expand...</summary><a href="https://bugs.php.net/bug.php?id=81420">https://bugs.php.net/bug.php?id=81420</a><br><a href="https://security.netapp.com/advisory/ntap-20211029-0007/">https://security.netapp.com/advisory/ntap-20211029-0007/</a><br></details> |
|
||
| php7-xmlwriter | CVE-2021-21707 | MEDIUM | 7.3.27-r0 | 7.3.33-r0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-21707">https://access.redhat.com/security/cve/CVE-2021-21707</a><br><a href="https://bugs.php.net/bug.php?id=79971">https://bugs.php.net/bug.php?id=79971</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">https://nvd.nist.gov/vuln/detail/CVE-2021-21707</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0005/">https://security.netapp.com/advisory/ntap-20211223-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5300-1">https://ubuntu.com/security/notices/USN-5300-1</a><br><a href="https://ubuntu.com/security/notices/USN-5300-2">https://ubuntu.com/security/notices/USN-5300-2</a><br><a href="https://ubuntu.com/security/notices/USN-5300-3">https://ubuntu.com/security/notices/USN-5300-3</a><br><a href="https://www.debian.org/security/2022/dsa-5082">https://www.debian.org/security/2022/dsa-5082</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| ssl_client | CVE-2022-28391 | CRITICAL | 1.31.1-r20 | 1.31.1-r22 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-28391">https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href="https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch">https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href="https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661">https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28391">https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details> |
|
||
| ssl_client | CVE-2021-42378 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42378">https://access.redhat.com/security/cve/CVE-2021-42378</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42378">https://nvd.nist.gov/vuln/detail/CVE-2021-42378</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42379 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42379">https://access.redhat.com/security/cve/CVE-2021-42379</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42379">https://nvd.nist.gov/vuln/detail/CVE-2021-42379</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42380 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42380">https://access.redhat.com/security/cve/CVE-2021-42380</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42380">https://nvd.nist.gov/vuln/detail/CVE-2021-42380</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42381 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42381">https://access.redhat.com/security/cve/CVE-2021-42381</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42381">https://nvd.nist.gov/vuln/detail/CVE-2021-42381</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42382 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42382">https://access.redhat.com/security/cve/CVE-2021-42382</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42382">https://nvd.nist.gov/vuln/detail/CVE-2021-42382</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42383 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42383">https://access.redhat.com/security/cve/CVE-2021-42383</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br></details> |
|
||
| ssl_client | CVE-2021-42384 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42384">https://access.redhat.com/security/cve/CVE-2021-42384</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42384">https://nvd.nist.gov/vuln/detail/CVE-2021-42384</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42385 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42385">https://access.redhat.com/security/cve/CVE-2021-42385</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42385">https://nvd.nist.gov/vuln/detail/CVE-2021-42385</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42386 | HIGH | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42386">https://access.redhat.com/security/cve/CVE-2021-42386</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42386">https://nvd.nist.gov/vuln/detail/CVE-2021-42386</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| ssl_client | CVE-2021-42374 | MEDIUM | 1.31.1-r20 | 1.31.1-r21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-42374">https://access.redhat.com/security/cve/CVE-2021-42374</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374</a><br><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42374">https://nvd.nist.gov/vuln/detail/CVE-2021-42374</a><br><a href="https://security.netapp.com/advisory/ntap-20211223-0002/">https://security.netapp.com/advisory/ntap-20211223-0002/</a><br><a href="https://ubuntu.com/security/notices/USN-5179-1">https://ubuntu.com/security/notices/USN-5179-1</a><br></details> |
|
||
| xz | CVE-2022-1271 | HIGH | 5.2.5-r0 | 5.2.5-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1271">https://access.redhat.com/security/cve/CVE-2022-1271</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1537.html">https://errata.almalinux.org/8/ALSA-2022-1537.html</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1271.html">https://linux.oracle.com/cve/CVE-2022-1271.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5052.html">https://linux.oracle.com/errata/ELSA-2022-5052.html</a><br><a href="https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html">https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html</a><br><a href="https://ubuntu.com/security/notices/USN-5378-1">https://ubuntu.com/security/notices/USN-5378-1</a><br><a href="https://ubuntu.com/security/notices/USN-5378-2">https://ubuntu.com/security/notices/USN-5378-2</a><br><a href="https://ubuntu.com/security/notices/USN-5378-3">https://ubuntu.com/security/notices/USN-5378-3</a><br><a href="https://ubuntu.com/security/notices/USN-5378-4">https://ubuntu.com/security/notices/USN-5378-4</a><br><a href="https://www.openwall.com/lists/oss-security/2022/04/07/8">https://www.openwall.com/lists/oss-security/2022/04/07/8</a><br></details> |
|
||
| xz-libs | CVE-2022-1271 | HIGH | 5.2.5-r0 | 5.2.5-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1271">https://access.redhat.com/security/cve/CVE-2022-1271</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-1537.html">https://errata.almalinux.org/8/ALSA-2022-1537.html</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1271.html">https://linux.oracle.com/cve/CVE-2022-1271.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5052.html">https://linux.oracle.com/errata/ELSA-2022-5052.html</a><br><a href="https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html">https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html</a><br><a href="https://ubuntu.com/security/notices/USN-5378-1">https://ubuntu.com/security/notices/USN-5378-1</a><br><a href="https://ubuntu.com/security/notices/USN-5378-2">https://ubuntu.com/security/notices/USN-5378-2</a><br><a href="https://ubuntu.com/security/notices/USN-5378-3">https://ubuntu.com/security/notices/USN-5378-3</a><br><a href="https://ubuntu.com/security/notices/USN-5378-4">https://ubuntu.com/security/notices/USN-5378-4</a><br><a href="https://www.openwall.com/lists/oss-security/2022/04/07/8">https://www.openwall.com/lists/oss-security/2022/04/07/8</a><br></details> |
|
||
| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/May/33">http://seclists.org/fulldisclosure/2022/May/33</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://seclists.org/fulldisclosure/2022/May/38">http://seclists.org/fulldisclosure/2022/May/38</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2018-25032">https://access.redhat.com/security/cve/CVE-2018-25032</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://errata.almalinux.org/8/ALSA-2022-2201.html">https://errata.almalinux.org/8/ALSA-2022-2201.html</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://github.com/madler/zlib/compare/v1.2.11...v1.2.12">https://github.com/madler/zlib/compare/v1.2.11...v1.2.12</a><br><a href="https://github.com/madler/zlib/issues/605">https://github.com/madler/zlib/issues/605</a><br><a href="https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4">https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4</a><br><a href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5</a><br><a href="https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ">https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ</a><br><a href="https://linux.oracle.com/cve/CVE-2018-25032.html">https://linux.oracle.com/cve/CVE-2018-25032.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-4592.html">https://linux.oracle.com/errata/ELSA-2022-4592.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html">https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">https://nvd.nist.gov/vuln/detail/CVE-2018-25032</a><br><a href="https://security.netapp.com/advisory/ntap-20220526-0009/">https://security.netapp.com/advisory/ntap-20220526-0009/</a><br><a href="https://support.apple.com/kb/HT213255">https://support.apple.com/kb/HT213255</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://support.apple.com/kb/HT213257">https://support.apple.com/kb/HT213257</a><br><a href="https://ubuntu.com/security/notices/USN-5355-1">https://ubuntu.com/security/notices/USN-5355-1</a><br><a href="https://ubuntu.com/security/notices/USN-5355-2">https://ubuntu.com/security/notices/USN-5355-2</a><br><a href="https://ubuntu.com/security/notices/USN-5359-1">https://ubuntu.com/security/notices/USN-5359-1</a><br><a href="https://ubuntu.com/security/notices/USN-5359-2">https://ubuntu.com/security/notices/USN-5359-2</a><br><a href="https://www.debian.org/security/2022/dsa-5111">https://www.debian.org/security/2022/dsa-5111</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">https://www.openwall.com/lists/oss-security/2022/03/28/1</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/28/3">https://www.openwall.com/lists/oss-security/2022/03/28/3</a><br></details> |
|
||
|
||
**node-pkg**
|
||
|
||
|
||
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|
||
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
|
||
| acorn | GHSA-6chw-6frg-f759 | HIGH | 6.1.1 | 5.7.4, 7.1.1, 6.4.1 | <details><summary>Expand...</summary><a href="https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802">https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802</a><br><a href="https://github.com/acornjs/acorn/issues/929">https://github.com/acornjs/acorn/issues/929</a><br><a href="https://github.com/advisories/GHSA-6chw-6frg-f759">https://github.com/advisories/GHSA-6chw-6frg-f759</a><br><a href="https://snyk.io/vuln/SNYK-JS-ACORN-559469">https://snyk.io/vuln/SNYK-JS-ACORN-559469</a><br><a href="https://www.npmjs.com/advisories/1488">https://www.npmjs.com/advisories/1488</a><br></details> |
|
||
| ajv | CVE-2020-15366 | MEDIUM | 6.10.0 | 6.12.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-15366">https://access.redhat.com/security/cve/CVE-2020-15366</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0551.html">https://errata.almalinux.org/8/ALSA-2021-0551.html</a><br><a href="https://github.com/advisories/GHSA-v88g-cgmw-v5xw">https://github.com/advisories/GHSA-v88g-cgmw-v5xw</a><br><a href="https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f">https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f</a><br><a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a><br><a href="https://github.com/ajv-validator/ajv/tags">https://github.com/ajv-validator/ajv/tags</a><br><a href="https://hackerone.com/bugs?subject=user&report_id=894259">https://hackerone.com/bugs?subject=user&report_id=894259</a><br><a href="https://linux.oracle.com/cve/CVE-2020-15366.html">https://linux.oracle.com/cve/CVE-2020-15366.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0551.html">https://linux.oracle.com/errata/ELSA-2021-0551.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15366">https://nvd.nist.gov/vuln/detail/CVE-2020-15366</a><br><a href="https://snyk.io/vuln/SNYK-JS-AJV-584908">https://snyk.io/vuln/SNYK-JS-AJV-584908</a><br></details> |
|
||
| ansi-html | CVE-2021-23424 | HIGH | 0.0.7 | 0.0.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23424">https://access.redhat.com/security/cve/CVE-2021-23424</a><br><a href="https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63">https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63</a><br><a href="https://github.com/Tjatse/ansi-html/issues/19">https://github.com/Tjatse/ansi-html/issues/19</a><br><a href="https://github.com/advisories/GHSA-whgm-jr23-g3j9">https://github.com/advisories/GHSA-whgm-jr23-g3j9</a><br><a href="https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69">https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23424">https://nvd.nist.gov/vuln/detail/CVE-2021-23424</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567198</a><br><a href="https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849">https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849</a><br></details> |
|
||
| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3807">https://access.redhat.com/security/cve/CVE-2021-3807</a><br><a href="https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908">https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href="https://github.com/advisories/GHSA-93q8-gq69-wqmw">https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href="https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9">https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311">https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774">https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href="https://github.com/chalk/ansi-regex/releases/tag/v6.0.1">https://github.com/chalk/ansi-regex/releases/tag/v6.0.1</a><br><a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3807.html">https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
|
||
| browserslist | CVE-2021-23364 | MEDIUM | 4.4.2 | 4.16.5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23364">https://access.redhat.com/security/cve/CVE-2021-23364</a><br><a href="https://github.com/advisories/GHSA-w8qv-6jwh-64r5">https://github.com/advisories/GHSA-w8qv-6jwh-64r5</a><br><a href="https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474">https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474</a><br><a href="https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98">https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98</a><br><a href="https://github.com/browserslist/browserslist/pull/593">https://github.com/browserslist/browserslist/pull/593</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23364">https://nvd.nist.gov/vuln/detail/CVE-2021-23364</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182</a><br><a href="https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194">https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194</a><br></details> |
|
||
| color-string | CVE-2021-29060 | MEDIUM | 1.5.3 | 1.5.5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29060">https://access.redhat.com/security/cve/CVE-2021-29060</a><br><a href="https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3">https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3</a><br><a href="https://github.com/Qix-/color-string/releases/tag/1.5.5">https://github.com/Qix-/color-string/releases/tag/1.5.5</a><br><a href="https://github.com/advisories/GHSA-257v-vj4p-3w2h">https://github.com/advisories/GHSA-257v-vj4p-3w2h</a><br><a href="https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md">https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md</a><br><a href="https://github.com/yetingli/SaveResults/blob/main/js/color-string.js">https://github.com/yetingli/SaveResults/blob/main/js/color-string.js</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29060">https://nvd.nist.gov/vuln/detail/CVE-2021-29060</a><br><a href="https://snyk.io/vuln/SNYK-JS-COLORSTRING-1082939">https://snyk.io/vuln/SNYK-JS-COLORSTRING-1082939</a><br><a href="https://www.npmjs.com/package/color-string">https://www.npmjs.com/package/color-string</a><br></details> |
|
||
| dns-packet | CVE-2021-23386 | HIGH | 1.3.1 | 1.3.2, 5.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23386">https://access.redhat.com/security/cve/CVE-2021-23386</a><br><a href="https://github.com/advisories/GHSA-3wcq-x3mq-6r9p">https://github.com/advisories/GHSA-3wcq-x3mq-6r9p</a><br><a href="https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d">https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d</a><br><a href="https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56">https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56</a><br><a href="https://hackerone.com/bugs?subject=user&amp%3Breport_id=968858">https://hackerone.com/bugs?subject=user&amp%3Breport_id=968858</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23386">https://nvd.nist.gov/vuln/detail/CVE-2021-23386</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719</a><br><a href="https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563">https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563</a><br></details> |
|
||
| dot-prop | CVE-2020-8116 | HIGH | 4.2.0 | 5.1.1, 4.2.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8116">https://access.redhat.com/security/cve/CVE-2020-8116</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0548.html">https://errata.almalinux.org/8/ALSA-2021-0548.html</a><br><a href="https://github.com/advisories/GHSA-ff7x-qrg7-qggm">https://github.com/advisories/GHSA-ff7x-qrg7-qggm</a><br><a href="https://github.com/sindresorhus/dot-prop/issues/63">https://github.com/sindresorhus/dot-prop/issues/63</a><br><a href="https://github.com/sindresorhus/dot-prop/tree/v4">https://github.com/sindresorhus/dot-prop/tree/v4</a><br><a href="https://hackerone.com/reports/719856">https://hackerone.com/reports/719856</a><br><a href="https://linux.oracle.com/cve/CVE-2020-8116.html">https://linux.oracle.com/cve/CVE-2020-8116.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0548.html">https://linux.oracle.com/errata/ELSA-2021-0548.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8116">https://nvd.nist.gov/vuln/detail/CVE-2020-8116</a><br></details> |
|
||
| elliptic | CVE-2020-13822 | HIGH | 6.4.1 | 6.5.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-13822">https://access.redhat.com/security/cve/CVE-2020-13822</a><br><a href="https://github.com/advisories/GHSA-vh7m-p724-62c2">https://github.com/advisories/GHSA-vh7m-p724-62c2</a><br><a href="https://github.com/indutny/elliptic/issues/226">https://github.com/indutny/elliptic/issues/226</a><br><a href="https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4">https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13822">https://nvd.nist.gov/vuln/detail/CVE-2020-13822</a><br><a href="https://snyk.io/vuln/SNYK-JS-ELLIPTIC-571484">https://snyk.io/vuln/SNYK-JS-ELLIPTIC-571484</a><br><a href="https://www.npmjs.com/package/elliptic">https://www.npmjs.com/package/elliptic</a><br><a href="https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/">https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/</a><br></details> |
|
||
| elliptic | CVE-2020-28498 | MEDIUM | 6.4.1 | 6.5.4 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-r9p9-mrjm-926w">https://github.com/advisories/GHSA-r9p9-mrjm-926w</a><br><a href="https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md">https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md</a><br><a href="https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f">https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f</a><br><a href="https://github.com/indutny/elliptic/pull/244/commits">https://github.com/indutny/elliptic/pull/244/commits</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28498">https://nvd.nist.gov/vuln/detail/CVE-2020-28498</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836</a><br><a href="https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899">https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899</a><br><a href="https://www.npmjs.com/package/elliptic">https://www.npmjs.com/package/elliptic</a><br></details> |
|
||
| eventsource | CVE-2022-1650 | CRITICAL | 1.0.7 | 2.0.2, 1.1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1650">https://access.redhat.com/security/cve/CVE-2022-1650</a><br><a href="https://github.com/EventSource/eventsource/commit/f9f6416567bff62c1af2f4314be51d9870e94bc2">https://github.com/EventSource/eventsource/commit/f9f6416567bff62c1af2f4314be51d9870e94bc2</a><br><a href="https://github.com/EventSource/eventsource/pull/273#issuecomment-1127624508">https://github.com/EventSource/eventsource/pull/273#issuecomment-1127624508</a><br><a href="https://github.com/advisories/GHSA-6h5x-7c5m-7cr7">https://github.com/advisories/GHSA-6h5x-7c5m-7cr7</a><br><a href="https://github.com/eventsource/eventsource/commit/10ee0c4881a6ba2fe65ec18ed195ac35889583c4">https://github.com/eventsource/eventsource/commit/10ee0c4881a6ba2fe65ec18ed195ac35889583c4</a><br><a href="https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e">https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1650">https://nvd.nist.gov/vuln/detail/CVE-2022-1650</a><br></details> |
|
||
| follow-redirects | CVE-2022-0155 | HIGH | 1.7.0 | 1.14.7 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0155">https://access.redhat.com/security/cve/CVE-2022-0155</a><br><a href="https://github.com/advisories/GHSA-74fj-2j2h-c42q">https://github.com/advisories/GHSA-74fj-2j2h-c42q</a><br><a href="https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22">https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22</a><br><a href="https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406">https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406</a><br><a href="https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/">https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0155">https://nvd.nist.gov/vuln/detail/CVE-2022-0155</a><br></details> |
|
||
| follow-redirects | CVE-2022-0536 | MEDIUM | 1.7.0 | 1.14.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0536">https://access.redhat.com/security/cve/CVE-2022-0536</a><br><a href="https://github.com/advisories/GHSA-pw2r-vq6v-hr8c">https://github.com/advisories/GHSA-pw2r-vq6v-hr8c</a><br><a href="https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445">https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445</a><br><a href="https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db">https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0536">https://nvd.nist.gov/vuln/detail/CVE-2022-0536</a><br></details> |
|
||
| glob-parent | CVE-2020-28469 | HIGH | 3.1.0 | 5.1.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-28469">https://access.redhat.com/security/cve/CVE-2020-28469</a><br><a href="https://github.com/advisories/GHSA-ww39-953v-wcq6">https://github.com/advisories/GHSA-ww39-953v-wcq6</a><br><a href="https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9">https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9</a><br><a href="https://github.com/gulpjs/glob-parent/pull/36">https://github.com/gulpjs/glob-parent/pull/36</a><br><a href="https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2">https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2</a><br><a href="https://linux.oracle.com/cve/CVE-2020-28469.html">https://linux.oracle.com/cve/CVE-2020-28469.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28469">https://nvd.nist.gov/vuln/detail/CVE-2020-28469</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092</a><br><a href="https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905">https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| hosted-git-info | CVE-2021-23362 | MEDIUM | 2.7.1 | 2.8.9, 3.0.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23362">https://access.redhat.com/security/cve/CVE-2021-23362</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3074.html">https://errata.almalinux.org/8/ALSA-2021-3074.html</a><br><a href="https://github.com/advisories/GHSA-43f8-2h32-f4cj">https://github.com/advisories/GHSA-43f8-2h32-f4cj</a><br><a href="https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7">https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7</a><br><a href="https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01">https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01</a><br><a href="https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3">https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3</a><br><a href="https://github.com/npm/hosted-git-info/commits/v2">https://github.com/npm/hosted-git-info/commits/v2</a><br><a href="https://github.com/npm/hosted-git-info/pull/76">https://github.com/npm/hosted-git-info/pull/76</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23362.html">https://linux.oracle.com/cve/CVE-2021-23362.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3074.html">https://linux.oracle.com/errata/ELSA-2021-3074.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23362">https://nvd.nist.gov/vuln/detail/CVE-2021-23362</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356</a><br><a href="https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355">https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355</a><br></details> |
|
||
| http-proxy | GHSA-6x33-pw7p-hmpq | HIGH | 1.17.0 | 1.18.1 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-6x33-pw7p-hmpq">https://github.com/advisories/GHSA-6x33-pw7p-hmpq</a><br><a href="https://github.com/http-party/node-http-proxy/pull/1447/files">https://github.com/http-party/node-http-proxy/pull/1447/files</a><br><a href="https://www.npmjs.com/advisories/1486">https://www.npmjs.com/advisories/1486</a><br></details> |
|
||
| ini | CVE-2020-7788 | HIGH | 1.3.5 | 1.3.6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7788">https://access.redhat.com/security/cve/CVE-2020-7788</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a><br><a href="https://github.com/advisories/GHSA-qqgx-2p2h-9c37">https://github.com/advisories/GHSA-qqgx-2p2h-9c37</a><br><a href="https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1">https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1</a><br><a href="https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)">https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7788.html">https://linux.oracle.com/cve/CVE-2020-7788.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html">https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">https://nvd.nist.gov/vuln/detail/CVE-2020-7788</a><br><a href="https://snyk.io/vuln/SNYK-JS-INI-1048974">https://snyk.io/vuln/SNYK-JS-INI-1048974</a><br><a href="https://www.npmjs.com/advisories/1589">https://www.npmjs.com/advisories/1589</a><br></details> |
|
||
| is-svg | CVE-2021-28092 | HIGH | 3.0.0 | 4.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-28092">https://access.redhat.com/security/cve/CVE-2021-28092</a><br><a href="https://github.com/advisories/GHSA-7r28-3m3f-r2pr">https://github.com/advisories/GHSA-7r28-3m3f-r2pr</a><br><a href="https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b">https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b</a><br><a href="https://github.com/sindresorhus/is-svg/releases">https://github.com/sindresorhus/is-svg/releases</a><br><a href="https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2">https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28092">https://nvd.nist.gov/vuln/detail/CVE-2021-28092</a><br><a href="https://security.netapp.com/advisory/ntap-20210513-0008/">https://security.netapp.com/advisory/ntap-20210513-0008/</a><br><a href="https://www.npmjs.com/package/is-svg">https://www.npmjs.com/package/is-svg</a><br></details> |
|
||
| is-svg | CVE-2021-29059 | HIGH | 3.0.0 | 4.3.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-29059">https://access.redhat.com/security/cve/CVE-2021-29059</a><br><a href="https://github.com/advisories/GHSA-r8j5-h5cx-65gg">https://github.com/advisories/GHSA-r8j5-h5cx-65gg</a><br><a href="https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02">https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02</a><br><a href="https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0">https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0</a><br><a href="https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md">https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md</a><br><a href="https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js">https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29059">https://nvd.nist.gov/vuln/detail/CVE-2021-29059</a><br><a href="https://www.npmjs.com/package/is-svg">https://www.npmjs.com/package/is-svg</a><br></details> |
|
||
| js-yaml | GHSA-8j8c-7jfh-h6hx | HIGH | 3.12.2 | 3.13.1 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-8j8c-7jfh-h6hx">https://github.com/advisories/GHSA-8j8c-7jfh-h6hx</a><br><a href="https://github.com/nodeca/js-yaml/pull/480">https://github.com/nodeca/js-yaml/pull/480</a><br><a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a><br></details> |
|
||
| js-yaml | GHSA-2pr6-76vf-7546 | MEDIUM | 3.12.2 | 3.13.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-2pr6-76vf-7546">https://github.com/advisories/GHSA-2pr6-76vf-7546</a><br><a href="https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235">https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235</a><br><a href="https://github.com/nodeca/js-yaml/issues/475">https://github.com/nodeca/js-yaml/issues/475</a><br><a href="https://snyk.io/vuln/SNYK-JS-JSYAML-173999">https://snyk.io/vuln/SNYK-JS-JSYAML-173999</a><br><a href="https://www.npmjs.com/advisories/788">https://www.npmjs.com/advisories/788</a><br><a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a><br></details> |
|
||
| kind-of | CVE-2019-20149 | HIGH | 6.0.2 | 6.0.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-20149">https://access.redhat.com/security/cve/CVE-2019-20149</a><br><a href="https://github.com/advisories/GHSA-6c8f-qphg-qjgp">https://github.com/advisories/GHSA-6c8f-qphg-qjgp</a><br><a href="https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b">https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b</a><br><a href="https://github.com/jonschlinkert/kind-of/issues/30">https://github.com/jonschlinkert/kind-of/issues/30</a><br><a href="https://github.com/jonschlinkert/kind-of/pull/31">https://github.com/jonschlinkert/kind-of/pull/31</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20149">https://nvd.nist.gov/vuln/detail/CVE-2019-20149</a><br><a href="https://snyk.io/vuln/SNYK-JS-KINDOF-537849">https://snyk.io/vuln/SNYK-JS-KINDOF-537849</a><br><a href="https://www.npmjs.com/advisories/1490">https://www.npmjs.com/advisories/1490</a><br></details> |
|
||
| lodash | CVE-2019-10744 | CRITICAL | 4.17.11 | 4.17.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/errata/RHSA-2019:3024">https://access.redhat.com/errata/RHSA-2019:3024</a><br><a href="https://access.redhat.com/security/cve/CVE-2019-10744">https://access.redhat.com/security/cve/CVE-2019-10744</a><br><a href="https://github.com/advisories/GHSA-jf85-cpcp-j695">https://github.com/advisories/GHSA-jf85-cpcp-j695</a><br><a href="https://github.com/lodash/lodash/pull/4336">https://github.com/lodash/lodash/pull/4336</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10744">https://nvd.nist.gov/vuln/detail/CVE-2019-10744</a><br><a href="https://security.netapp.com/advisory/ntap-20191004-0005/">https://security.netapp.com/advisory/ntap-20191004-0005/</a><br><a href="https://snyk.io/vuln/SNYK-JS-LODASH-450202">https://snyk.io/vuln/SNYK-JS-LODASH-450202</a><br><a href="https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS</a><br><a href="https://www.npmjs.com/advisories/1065">https://www.npmjs.com/advisories/1065</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
|
||
| lodash | CVE-2020-8203 | HIGH | 4.17.11 | 4.17.20 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8203">https://access.redhat.com/security/cve/CVE-2020-8203</a><br><a href="https://github.com/advisories/GHSA-p6mc-m468-83gw">https://github.com/advisories/GHSA-p6mc-m468-83gw</a><br><a href="https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12">https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12</a><br><a href="https://github.com/lodash/lodash/issues/4744">https://github.com/lodash/lodash/issues/4744</a><br><a href="https://github.com/lodash/lodash/issues/4874">https://github.com/lodash/lodash/issues/4874</a><br><a href="https://hackerone.com/reports/712065">https://hackerone.com/reports/712065</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8203">https://nvd.nist.gov/vuln/detail/CVE-2020-8203</a><br><a href="https://security.netapp.com/advisory/ntap-20200724-0006/">https://security.netapp.com/advisory/ntap-20200724-0006/</a><br><a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| lodash | CVE-2021-23337 | HIGH | 4.17.11 | 4.17.21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23337">https://access.redhat.com/security/cve/CVE-2021-23337</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337</a><br><a href="https://github.com/advisories/GHSA-35jh-r3h4-6jhm">https://github.com/advisories/GHSA-35jh-r3h4-6jhm</a><br><a href="https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851">https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851</a><br><a href="https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851">https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851</a><br><a href="https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c">https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23337">https://nvd.nist.gov/vuln/detail/CVE-2021-23337</a><br><a href="https://security.netapp.com/advisory/ntap-20210312-0006/">https://security.netapp.com/advisory/ntap-20210312-0006/</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932">https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929</a><br><a href="https://snyk.io/vuln/SNYK-JS-LODASH-1040724">https://snyk.io/vuln/SNYK-JS-LODASH-1040724</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| lodash | CVE-2020-28500 | MEDIUM | 4.17.11 | 4.17.21 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-28500">https://access.redhat.com/security/cve/CVE-2020-28500</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a><br><a href="https://github.com/advisories/GHSA-29mw-wpgm-hmr9">https://github.com/advisories/GHSA-29mw-wpgm-hmr9</a><br><a href="https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8">https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8</a><br><a href="https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8">https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8</a><br><a href="https://github.com/lodash/lodash/pull/5065">https://github.com/lodash/lodash/pull/5065</a><br><a href="https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7">https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28500">https://nvd.nist.gov/vuln/detail/CVE-2020-28500</a><br><a href="https://security.netapp.com/advisory/ntap-20210312-0006/">https://security.netapp.com/advisory/ntap-20210312-0006/</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896">https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893</a><br><a href="https://snyk.io/vuln/SNYK-JS-LODASH-1018905">https://snyk.io/vuln/SNYK-JS-LODASH-1018905</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| mem | GHSA-4xcv-9jjx-gfj3 | MEDIUM | 1.1.0 | 4.0.0 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1623744">https://bugzilla.redhat.com/show_bug.cgi?id=1623744</a><br><a href="https://github.com/advisories/GHSA-4xcv-9jjx-gfj3">https://github.com/advisories/GHSA-4xcv-9jjx-gfj3</a><br><a href="https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b">https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b</a><br><a href="https://snyk.io/vuln/npm:mem:20180117">https://snyk.io/vuln/npm:mem:20180117</a><br><a href="https://www.npmjs.com/advisories/1084">https://www.npmjs.com/advisories/1084</a><br></details> |
|
||
| minimist | CVE-2021-44906 | CRITICAL | 0.0.8 | 1.2.6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-44906">https://access.redhat.com/security/cve/CVE-2021-44906</a><br><a href="https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip">https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip</a><br><a href="https://github.com/advisories/GHSA-xvch-5gv4-984h">https://github.com/advisories/GHSA-xvch-5gv4-984h</a><br><a href="https://github.com/substack/minimist/blob/master/index.js#L69">https://github.com/substack/minimist/blob/master/index.js#L69</a><br><a href="https://github.com/substack/minimist/issues/164">https://github.com/substack/minimist/issues/164</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a><br><a href="https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068">https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068</a><br></details> |
|
||
| minimist | CVE-2020-7598 | MEDIUM | 0.0.8 | 1.2.3, 0.2.1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7598">https://access.redhat.com/security/cve/CVE-2020-7598</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-2852.html">https://errata.almalinux.org/8/ALSA-2020-2852.html</a><br><a href="https://github.com/advisories/GHSA-vh95-rmgr-6w4m">https://github.com/advisories/GHSA-vh95-rmgr-6w4m</a><br><a href="https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab">https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab</a><br><a href="https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95">https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95</a><br><a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7598.html">https://linux.oracle.com/cve/CVE-2020-7598.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-2852.html">https://linux.oracle.com/errata/ELSA-2020-2852.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">https://nvd.nist.gov/vuln/detail/CVE-2020-7598</a><br><a href="https://snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://www.npmjs.com/advisories/1179">https://www.npmjs.com/advisories/1179</a><br></details> |
|
||
| minimist | CVE-2021-44906 | CRITICAL | 1.2.0 | 1.2.6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-44906">https://access.redhat.com/security/cve/CVE-2021-44906</a><br><a href="https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip">https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip</a><br><a href="https://github.com/advisories/GHSA-xvch-5gv4-984h">https://github.com/advisories/GHSA-xvch-5gv4-984h</a><br><a href="https://github.com/substack/minimist/blob/master/index.js#L69">https://github.com/substack/minimist/blob/master/index.js#L69</a><br><a href="https://github.com/substack/minimist/issues/164">https://github.com/substack/minimist/issues/164</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a><br><a href="https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068">https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068</a><br></details> |
|
||
| minimist | CVE-2020-7598 | MEDIUM | 1.2.0 | 1.2.3, 0.2.1 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html">http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-7598">https://access.redhat.com/security/cve/CVE-2020-7598</a><br><a href="https://errata.almalinux.org/8/ALSA-2020-2852.html">https://errata.almalinux.org/8/ALSA-2020-2852.html</a><br><a href="https://github.com/advisories/GHSA-vh95-rmgr-6w4m">https://github.com/advisories/GHSA-vh95-rmgr-6w4m</a><br><a href="https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab">https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab</a><br><a href="https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95">https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95</a><br><a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7598.html">https://linux.oracle.com/cve/CVE-2020-7598.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2020-2852.html">https://linux.oracle.com/errata/ELSA-2020-2852.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">https://nvd.nist.gov/vuln/detail/CVE-2020-7598</a><br><a href="https://snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://www.npmjs.com/advisories/1179">https://www.npmjs.com/advisories/1179</a><br></details> |
|
||
| mixin-deep | CVE-2019-10746 | CRITICAL | 1.3.1 | 2.0.1, 1.3.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-10746">https://access.redhat.com/security/cve/CVE-2019-10746</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0549.html">https://errata.almalinux.org/8/ALSA-2021-0549.html</a><br><a href="https://github.com/advisories/GHSA-fhjf-83wg-r2j9">https://github.com/advisories/GHSA-fhjf-83wg-r2j9</a><br><a href="https://linux.oracle.com/cve/CVE-2019-10746.html">https://linux.oracle.com/cve/CVE-2019-10746.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0549.html">https://linux.oracle.com/errata/ELSA-2021-0549.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10746">https://nvd.nist.gov/vuln/detail/CVE-2019-10746</a><br><a href="https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212">https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212</a><br><a href="https://www.npmjs.com/advisories/1013">https://www.npmjs.com/advisories/1013</a><br></details> |
|
||
| moment | CVE-2022-24785 | HIGH | 2.24.0 | 2.29.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24785">https://access.redhat.com/security/cve/CVE-2022-24785</a><br><a href="https://github.com/advisories/GHSA-8hfj-j24r-96c4">https://github.com/advisories/GHSA-8hfj-j24r-96c4</a><br><a href="https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5">https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5</a><br><a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24785">https://nvd.nist.gov/vuln/detail/CVE-2022-24785</a><br><a href="https://security.netapp.com/advisory/ntap-20220513-0006/">https://security.netapp.com/advisory/ntap-20220513-0006/</a><br><a href="https://www.tenable.com/security/tns-2022-09">https://www.tenable.com/security/tns-2022-09</a><br></details> |
|
||
| node-forge | CVE-2020-7720 | HIGH | 0.7.5 | 0.10.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7720">https://access.redhat.com/security/cve/CVE-2020-7720</a><br><a href="https://github.com/advisories/GHSA-92xj-mqp7-vmcj">https://github.com/advisories/GHSA-92xj-mqp7-vmcj</a><br><a href="https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md">https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md</a><br><a href="https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed">https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7720">https://nvd.nist.gov/vuln/detail/CVE-2020-7720</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293</a><br><a href="https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677">https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677</a><br></details> |
|
||
| node-forge | CVE-2022-24771 | HIGH | 0.7.5 | 1.3.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24771">https://access.redhat.com/security/cve/CVE-2022-24771</a><br><a href="https://github.com/advisories/GHSA-cfm4-qjh2-4765">https://github.com/advisories/GHSA-cfm4-qjh2-4765</a><br><a href="https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1">https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1</a><br><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2">https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765">https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24771">https://nvd.nist.gov/vuln/detail/CVE-2022-24771</a><br></details> |
|
||
| node-forge | CVE-2022-24772 | HIGH | 0.7.5 | 1.3.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24772">https://access.redhat.com/security/cve/CVE-2022-24772</a><br><a href="https://github.com/advisories/GHSA-x4jg-mjrx-434g">https://github.com/advisories/GHSA-x4jg-mjrx-434g</a><br><a href="https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1">https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1</a><br><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2">https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g">https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24772">https://nvd.nist.gov/vuln/detail/CVE-2022-24772</a><br></details> |
|
||
| node-forge | CVE-2022-0122 | MEDIUM | 0.7.5 | 1.0.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-8fr3-hfg3-gpgp">https://github.com/advisories/GHSA-8fr3-hfg3-gpgp</a><br><a href="https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e">https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e</a><br><a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0122">https://nvd.nist.gov/vuln/detail/CVE-2022-0122</a><br></details> |
|
||
| node-forge | CVE-2022-24773 | MEDIUM | 0.7.5 | 1.3.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-24773">https://access.redhat.com/security/cve/CVE-2022-24773</a><br><a href="https://github.com/advisories/GHSA-2r2c-g63r-vccr">https://github.com/advisories/GHSA-2r2c-g63r-vccr</a><br><a href="https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1">https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1</a><br><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2">https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr">https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24773">https://nvd.nist.gov/vuln/detail/CVE-2022-24773</a><br></details> |
|
||
| node-forge | GHSA-5rrq-pxf6-6jx5 | LOW | 0.7.5 | 1.0.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-5rrq-pxf6-6jx5">https://github.com/advisories/GHSA-5rrq-pxf6-6jx5</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5">https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5</a><br></details> |
|
||
| node-forge | GHSA-gf8q-jrpm-jvxq | LOW | 0.7.5 | 1.0.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-gf8q-jrpm-jvxq">https://github.com/advisories/GHSA-gf8q-jrpm-jvxq</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq">https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq</a><br></details> |
|
||
| node-forge | GHSA-wxgw-qj99-44c2 | LOW | 0.7.5 | 0.10.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-wxgw-qj99-44c2">https://github.com/advisories/GHSA-wxgw-qj99-44c2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2">https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2</a><br></details> |
|
||
| node-notifier | CVE-2020-7789 | MEDIUM | 5.4.0 | 8.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7789">https://access.redhat.com/security/cve/CVE-2020-7789</a><br><a href="https://github.com/advisories/GHSA-5fw9-fq32-wv5p">https://github.com/advisories/GHSA-5fw9-fq32-wv5p</a><br><a href="https://github.com/mikaelbr/node-notifier/blob/master/lib/utils.js%23L303">https://github.com/mikaelbr/node-notifier/blob/master/lib/utils.js%23L303</a><br><a href="https://github.com/mikaelbr/node-notifier/commit/5d62799dab88505a709cd032653b2320c5813fce">https://github.com/mikaelbr/node-notifier/commit/5d62799dab88505a709cd032653b2320c5813fce</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7789">https://nvd.nist.gov/vuln/detail/CVE-2020-7789</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050371">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050371</a><br><a href="https://snyk.io/vuln/SNYK-JS-NODENOTIFIER-1035794">https://snyk.io/vuln/SNYK-JS-NODENOTIFIER-1035794</a><br></details> |
|
||
| nth-check | CVE-2021-3803 | HIGH | 1.0.2 | 2.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3803">https://access.redhat.com/security/cve/CVE-2021-3803</a><br><a href="https://github.com/advisories/GHSA-rp65-9cf3-cjxr">https://github.com/advisories/GHSA-rp65-9cf3-cjxr</a><br><a href="https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726">https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726</a><br><a href="https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0">https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3803">https://nvd.nist.gov/vuln/detail/CVE-2021-3803</a><br></details> |
|
||
| object-path | CVE-2020-15256 | HIGH | 0.9.2 | 0.11.5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-15256">https://access.redhat.com/security/cve/CVE-2020-15256</a><br><a href="https://github.com/advisories/GHSA-cwx2-736x-mf6w">https://github.com/advisories/GHSA-cwx2-736x-mf6w</a><br><a href="https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68">https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68</a><br><a href="https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w">https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15256">https://nvd.nist.gov/vuln/detail/CVE-2020-15256</a><br></details> |
|
||
| object-path | CVE-2021-3805 | HIGH | 0.9.2 | 0.11.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3805">https://access.redhat.com/security/cve/CVE-2021-3805</a><br><a href="https://github.com/advisories/GHSA-8v63-cqqc-6r2c">https://github.com/advisories/GHSA-8v63-cqqc-6r2c</a><br><a href="https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884">https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884</a><br><a href="https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6">https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6</a><br><a href="https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053">https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3805">https://nvd.nist.gov/vuln/detail/CVE-2021-3805</a><br></details> |
|
||
| object-path | CVE-2021-23434 | MEDIUM | 0.9.2 | 0.11.6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23434">https://access.redhat.com/security/cve/CVE-2021-23434</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23434">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23434</a><br><a href="https://github.com/advisories/GHSA-v39p-96qg-c8rf">https://github.com/advisories/GHSA-v39p-96qg-c8rf</a><br><a href="https://github.com/mariocasciaro/object-path#0116">https://github.com/mariocasciaro/object-path#0116</a><br><a href="https://github.com/mariocasciaro/object-path%230116">https://github.com/mariocasciaro/object-path%230116</a><br><a href="https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb">https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23434">https://nvd.nist.gov/vuln/detail/CVE-2021-23434</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423</a><br><a href="https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453">https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453</a><br></details> |
|
||
| path-parse | CVE-2021-23343 | MEDIUM | 1.0.6 | 1.0.7 | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json</a><br><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-23343">https://access.redhat.com/security/cve/CVE-2021-23343</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3666.html">https://errata.almalinux.org/8/ALSA-2021-3666.html</a><br><a href="https://github.com/advisories/GHSA-hj48-42vr-x3v9">https://github.com/advisories/GHSA-hj48-42vr-x3v9</a><br><a href="https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7">https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7</a><br><a href="https://github.com/jbgutierrez/path-parse/issues/8">https://github.com/jbgutierrez/path-parse/issues/8</a><br><a href="https://github.com/jbgutierrez/path-parse/pull/10">https://github.com/jbgutierrez/path-parse/pull/10</a><br><a href="https://linux.oracle.com/cve/CVE-2021-23343.html">https://linux.oracle.com/cve/CVE-2021-23343.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23343">https://nvd.nist.gov/vuln/detail/CVE-2021-23343</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028</a><br><a href="https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067">https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067</a><br></details> |
|
||
| postcss | CVE-2021-23382 | MEDIUM | 6.0.23 | 7.0.36, 8.2.13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23382">https://access.redhat.com/security/cve/CVE-2021-23382</a><br><a href="https://github.com/advisories/GHSA-566m-qj78-rww5">https://github.com/advisories/GHSA-566m-qj78-rww5</a><br><a href="https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956">https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956</a><br><a href="https://github.com/postcss/postcss/releases/tag/7.0.36">https://github.com/postcss/postcss/releases/tag/7.0.36</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23382">https://nvd.nist.gov/vuln/detail/CVE-2021-23382</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641</a><br><a href="https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640">https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640</a><br></details> |
|
||
| postcss | CVE-2021-23368 | MEDIUM | 7.0.14 | 8.2.10, 7.0.36 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23368">https://access.redhat.com/security/cve/CVE-2021-23368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368</a><br><a href="https://github.com/advisories/GHSA-hwj9-h5mp-3pm3">https://github.com/advisories/GHSA-hwj9-h5mp-3pm3</a><br><a href="https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734">https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734</a><br><a href="https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4">https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4</a><br><a href="https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5">https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5</a><br><a href="https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E">https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E">https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23368">https://nvd.nist.gov/vuln/detail/CVE-2021-23368</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795</a><br><a href="https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595">https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595</a><br></details> |
|
||
| postcss | CVE-2021-23382 | MEDIUM | 7.0.14 | 7.0.36, 8.2.13 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23382">https://access.redhat.com/security/cve/CVE-2021-23382</a><br><a href="https://github.com/advisories/GHSA-566m-qj78-rww5">https://github.com/advisories/GHSA-566m-qj78-rww5</a><br><a href="https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956">https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956</a><br><a href="https://github.com/postcss/postcss/releases/tag/7.0.36">https://github.com/postcss/postcss/releases/tag/7.0.36</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23382">https://nvd.nist.gov/vuln/detail/CVE-2021-23382</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641</a><br><a href="https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640">https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640</a><br></details> |
|
||
| serialize-javascript | CVE-2020-7660 | HIGH | 1.6.1 | 3.1.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7660">https://access.redhat.com/security/cve/CVE-2020-7660</a><br><a href="https://github.com/advisories/GHSA-hxcc-f52p-wc94">https://github.com/advisories/GHSA-hxcc-f52p-wc94</a><br><a href="https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd">https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7660">https://nvd.nist.gov/vuln/detail/CVE-2020-7660</a><br></details> |
|
||
| serialize-javascript | CVE-2019-16769 | MEDIUM | 1.6.1 | 2.1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-16769">https://access.redhat.com/security/cve/CVE-2019-16769</a><br><a href="https://github.com/advisories/GHSA-h9rv-jmmf-4pgx">https://github.com/advisories/GHSA-h9rv-jmmf-4pgx</a><br><a href="https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx">https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-16769">https://nvd.nist.gov/vuln/detail/CVE-2019-16769</a><br><a href="https://www.npmjs.com/advisories/1426">https://www.npmjs.com/advisories/1426</a><br></details> |
|
||
| set-value | CVE-2019-10747 | CRITICAL | 0.4.3 | 3.0.1, 2.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-10747">https://access.redhat.com/security/cve/CVE-2019-10747</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0549.html">https://errata.almalinux.org/8/ALSA-2021-0549.html</a><br><a href="https://github.com/advisories/GHSA-4g88-fppr-53pp">https://github.com/advisories/GHSA-4g88-fppr-53pp</a><br><a href="https://linux.oracle.com/cve/CVE-2019-10747.html">https://linux.oracle.com/cve/CVE-2019-10747.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0549.html">https://linux.oracle.com/errata/ELSA-2021-0549.html</a><br><a href="https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E">https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10747">https://nvd.nist.gov/vuln/detail/CVE-2019-10747</a><br><a href="https://snyk.io/vuln/SNYK-JS-SETVALUE-450213">https://snyk.io/vuln/SNYK-JS-SETVALUE-450213</a><br><a href="https://www.npmjs.com/advisories/1012">https://www.npmjs.com/advisories/1012</a><br></details> |
|
||
| set-value | CVE-2021-23440 | HIGH | 0.4.3 | 2.0.1, 4.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23440">https://access.redhat.com/security/cve/CVE-2021-23440</a><br><a href="https://github.com/advisories/GHSA-4jqc-8m5r-9rpr">https://github.com/advisories/GHSA-4jqc-8m5r-9rpr</a><br><a href="https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452">https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452</a><br><a href="https://github.com/jonschlinkert/set-value/pull/33">https://github.com/jonschlinkert/set-value/pull/33</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23440">https://nvd.nist.gov/vuln/detail/CVE-2021-23440</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212</a><br><a href="https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541">https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541</a><br><a href="https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/">https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| set-value | CVE-2019-10747 | CRITICAL | 2.0.0 | 3.0.1, 2.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-10747">https://access.redhat.com/security/cve/CVE-2019-10747</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0549.html">https://errata.almalinux.org/8/ALSA-2021-0549.html</a><br><a href="https://github.com/advisories/GHSA-4g88-fppr-53pp">https://github.com/advisories/GHSA-4g88-fppr-53pp</a><br><a href="https://linux.oracle.com/cve/CVE-2019-10747.html">https://linux.oracle.com/cve/CVE-2019-10747.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0549.html">https://linux.oracle.com/errata/ELSA-2021-0549.html</a><br><a href="https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E">https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10747">https://nvd.nist.gov/vuln/detail/CVE-2019-10747</a><br><a href="https://snyk.io/vuln/SNYK-JS-SETVALUE-450213">https://snyk.io/vuln/SNYK-JS-SETVALUE-450213</a><br><a href="https://www.npmjs.com/advisories/1012">https://www.npmjs.com/advisories/1012</a><br></details> |
|
||
| set-value | CVE-2021-23440 | HIGH | 2.0.0 | 2.0.1, 4.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-23440">https://access.redhat.com/security/cve/CVE-2021-23440</a><br><a href="https://github.com/advisories/GHSA-4jqc-8m5r-9rpr">https://github.com/advisories/GHSA-4jqc-8m5r-9rpr</a><br><a href="https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452">https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452</a><br><a href="https://github.com/jonschlinkert/set-value/pull/33">https://github.com/jonschlinkert/set-value/pull/33</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23440">https://nvd.nist.gov/vuln/detail/CVE-2021-23440</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212</a><br><a href="https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541">https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541</a><br><a href="https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/">https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/</a><br><a href="https://www.oracle.com/security-alerts/cpujan2022.html">https://www.oracle.com/security-alerts/cpujan2022.html</a><br></details> |
|
||
| sockjs | CVE-2020-7693 | MEDIUM | 0.3.19 | 0.3.20 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7693">https://access.redhat.com/security/cve/CVE-2020-7693</a><br><a href="https://github.com/advisories/GHSA-c9g6-9335-x697">https://github.com/advisories/GHSA-c9g6-9335-x697</a><br><a href="https://github.com/andsnw/sockjs-dos-py">https://github.com/andsnw/sockjs-dos-py</a><br><a href="https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16">https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16</a><br><a href="https://github.com/sockjs/sockjs-node/issues/252">https://github.com/sockjs/sockjs-node/issues/252</a><br><a href="https://github.com/sockjs/sockjs-node/pull/265">https://github.com/sockjs/sockjs-node/pull/265</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7693">https://nvd.nist.gov/vuln/detail/CVE-2020-7693</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448</a><br><a href="https://snyk.io/vuln/SNYK-JS-SOCKJS-575261">https://snyk.io/vuln/SNYK-JS-SOCKJS-575261</a><br><a href="https://www.npmjs.com/package/sockjs">https://www.npmjs.com/package/sockjs</a><br></details> |
|
||
| ssri | CVE-2021-27290 | HIGH | 6.0.1 | 8.0.1, 7.1.1, 6.0.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27290">https://access.redhat.com/security/cve/CVE-2021-27290</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290</a><br><a href="https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf">https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3074.html">https://errata.almalinux.org/8/ALSA-2021-3074.html</a><br><a href="https://github.com/advisories/GHSA-vx3p-948g-6vhq">https://github.com/advisories/GHSA-vx3p-948g-6vhq</a><br><a href="https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2">https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2</a><br><a href="https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1">https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1</a><br><a href="https://github.com/npm/ssri/pull/20#issuecomment-842677644">https://github.com/npm/ssri/pull/20#issuecomment-842677644</a><br><a href="https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf">https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27290.html">https://linux.oracle.com/cve/CVE-2021-27290.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3074.html">https://linux.oracle.com/errata/ELSA-2021-3074.html</a><br><a href="https://npmjs.com">https://npmjs.com</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27290">https://nvd.nist.gov/vuln/detail/CVE-2021-27290</a><br><a href="https://www.npmjs.com/package/ssri">https://www.npmjs.com/package/ssri</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| tar | CVE-2021-32803 | HIGH | 4.4.8 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32803">https://access.redhat.com/security/cve/CVE-2021-32803</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3666.html">https://errata.almalinux.org/8/ALSA-2021-3666.html</a><br><a href="https://github.com/advisories/GHSA-r628-mhmh-qjhw">https://github.com/advisories/GHSA-r628-mhmh-qjhw</a><br><a href="https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20">https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw">https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32803.html">https://linux.oracle.com/cve/CVE-2021-32803.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32803">https://nvd.nist.gov/vuln/detail/CVE-2021-32803</a><br><a href="https://www.npmjs.com/advisories/1771">https://www.npmjs.com/advisories/1771</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| tar | CVE-2021-32804 | HIGH | 4.4.8 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32804">https://access.redhat.com/security/cve/CVE-2021-32804</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3666.html">https://errata.almalinux.org/8/ALSA-2021-3666.html</a><br><a href="https://github.com/advisories/GHSA-3jfq-g458-7qm9">https://github.com/advisories/GHSA-3jfq-g458-7qm9</a><br><a href="https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4">https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9">https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32804.html">https://linux.oracle.com/cve/CVE-2021-32804.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32804">https://nvd.nist.gov/vuln/detail/CVE-2021-32804</a><br><a href="https://www.npmjs.com/advisories/1770">https://www.npmjs.com/advisories/1770</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| tar | CVE-2021-37701 | HIGH | 4.4.8 | 6.1.7, 5.0.8, 4.4.16 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37701">https://access.redhat.com/security/cve/CVE-2021-37701</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-9r2w-394v-53qc">https://github.com/advisories/GHSA-9r2w-394v-53qc</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37701.html">https://linux.oracle.com/cve/CVE-2021-37701.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37701">https://nvd.nist.gov/vuln/detail/CVE-2021-37701</a><br><a href="https://www.debian.org/security/2021/dsa-5008">https://www.debian.org/security/2021/dsa-5008</a><br><a href="https://www.npmjs.com/advisories/1779">https://www.npmjs.com/advisories/1779</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| tar | CVE-2021-37712 | HIGH | 4.4.8 | 6.1.9, 5.0.10, 4.4.18 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37712">https://access.redhat.com/security/cve/CVE-2021-37712</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-qq89-hq3f-393p">https://github.com/advisories/GHSA-qq89-hq3f-393p</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p">https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37712.html">https://linux.oracle.com/cve/CVE-2021-37712.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37712">https://nvd.nist.gov/vuln/detail/CVE-2021-37712</a><br><a href="https://www.debian.org/security/2021/dsa-5008">https://www.debian.org/security/2021/dsa-5008</a><br><a href="https://www.npmjs.com/advisories/1780">https://www.npmjs.com/advisories/1780</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| tar | CVE-2021-37713 | HIGH | 4.4.8 | 6.1.9, 5.0.10, 4.4.18 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-37713">https://access.redhat.com/security/cve/CVE-2021-37713</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-5955-9wpr-37jh">https://github.com/advisories/GHSA-5955-9wpr-37jh</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh">https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37713">https://nvd.nist.gov/vuln/detail/CVE-2021-37713</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||
| url-parse | CVE-2022-0686 | CRITICAL | 1.4.4 | 1.5.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0686">https://access.redhat.com/security/cve/CVE-2022-0686</a><br><a href="https://github.com/advisories/GHSA-hgjh-723h-mx2j">https://github.com/advisories/GHSA-hgjh-723h-mx2j</a><br><a href="https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5">https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5</a><br><a href="https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c">https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0686">https://nvd.nist.gov/vuln/detail/CVE-2022-0686</a><br><a href="https://security.netapp.com/advisory/ntap-20220325-0006/">https://security.netapp.com/advisory/ntap-20220325-0006/</a><br></details> |
|
||
| url-parse | CVE-2020-8124 | MEDIUM | 1.4.4 | 1.4.5 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-8124">https://access.redhat.com/security/cve/CVE-2020-8124</a><br><a href="https://github.com/advisories/GHSA-46c4-8wrp-j99v">https://github.com/advisories/GHSA-46c4-8wrp-j99v</a><br><a href="https://hackerone.com/reports/496293">https://hackerone.com/reports/496293</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8124">https://nvd.nist.gov/vuln/detail/CVE-2020-8124</a><br></details> |
|
||
| url-parse | CVE-2021-27515 | MEDIUM | 1.4.4 | 1.5.0 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-27515">https://access.redhat.com/security/cve/CVE-2021-27515</a><br><a href="https://advisory.checkmarx.net/advisory/CX-2021-4306">https://advisory.checkmarx.net/advisory/CX-2021-4306</a><br><a href="https://github.com/advisories/GHSA-9m6j-fcg5-2442">https://github.com/advisories/GHSA-9m6j-fcg5-2442</a><br><a href="https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0">https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0</a><br><a href="https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0">https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0</a><br><a href="https://github.com/unshiftio/url-parse/pull/197">https://github.com/unshiftio/url-parse/pull/197</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27515">https://nvd.nist.gov/vuln/detail/CVE-2021-27515</a><br></details> |
|
||
| url-parse | CVE-2021-3664 | MEDIUM | 1.4.4 | 1.5.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3664">https://access.redhat.com/security/cve/CVE-2021-3664</a><br><a href="https://github.com/advisories/GHSA-hh27-ffr2-f2jc">https://github.com/advisories/GHSA-hh27-ffr2-f2jc</a><br><a href="https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0">https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0</a><br><a href="https://github.com/unshiftio/url-parse/issues/205">https://github.com/unshiftio/url-parse/issues/205</a><br><a href="https://github.com/unshiftio/url-parse/issues/206">https://github.com/unshiftio/url-parse/issues/206</a><br><a href="https://huntr.dev/bounties/1625557993985-unshiftio/url-parse">https://huntr.dev/bounties/1625557993985-unshiftio/url-parse</a><br><a href="https://huntr.dev/bounties/1625557993985-unshiftio/url-parse/">https://huntr.dev/bounties/1625557993985-unshiftio/url-parse/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3664">https://nvd.nist.gov/vuln/detail/CVE-2021-3664</a><br></details> |
|
||
| url-parse | CVE-2022-0512 | MEDIUM | 1.4.4 | 1.5.6 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0512">https://access.redhat.com/security/cve/CVE-2022-0512</a><br><a href="https://github.com/advisories/GHSA-rqff-837h-mm52">https://github.com/advisories/GHSA-rqff-837h-mm52</a><br><a href="https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40">https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40</a><br><a href="https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b">https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0512">https://nvd.nist.gov/vuln/detail/CVE-2022-0512</a><br></details> |
|
||
| url-parse | CVE-2022-0639 | MEDIUM | 1.4.4 | 1.5.7 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0639">https://access.redhat.com/security/cve/CVE-2022-0639</a><br><a href="https://github.com/advisories/GHSA-8v38-pw62-9cw2">https://github.com/advisories/GHSA-8v38-pw62-9cw2</a><br><a href="https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788">https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788</a><br><a href="https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155">https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0639">https://nvd.nist.gov/vuln/detail/CVE-2022-0639</a><br></details> |
|
||
| url-parse | CVE-2022-0691 | MEDIUM | 1.4.4 | 1.5.9 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0691">https://access.redhat.com/security/cve/CVE-2022-0691</a><br><a href="https://github.com/advisories/GHSA-jf5r-8hm2-f872">https://github.com/advisories/GHSA-jf5r-8hm2-f872</a><br><a href="https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63">https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63</a><br><a href="https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4">https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0691">https://nvd.nist.gov/vuln/detail/CVE-2022-0691</a><br><a href="https://security.netapp.com/advisory/ntap-20220325-0006/">https://security.netapp.com/advisory/ntap-20220325-0006/</a><br></details> |
|
||
| websocket-extensions | CVE-2020-7662 | HIGH | 0.1.3 | 0.1.4 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7662">https://access.redhat.com/security/cve/CVE-2020-7662</a><br><a href="https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions">https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions</a><br><a href="https://github.com/advisories/GHSA-g78m-2chm-r7qv">https://github.com/advisories/GHSA-g78m-2chm-r7qv</a><br><a href="https://github.com/faye/websocket-extensions-node/commit/29496f6838bfadfe5a2f85dff33ed0ba33873237">https://github.com/faye/websocket-extensions-node/commit/29496f6838bfadfe5a2f85dff33ed0ba33873237</a><br><a href="https://github.com/faye/websocket-extensions-node/security/advisories/GHSA-g78m-2chm-r7qv">https://github.com/faye/websocket-extensions-node/security/advisories/GHSA-g78m-2chm-r7qv</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7662">https://nvd.nist.gov/vuln/detail/CVE-2020-7662</a><br><a href="https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623">https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623</a><br></details> |
|
||
| y18n | CVE-2020-7774 | HIGH | 3.2.1 | 5.0.5, 4.0.1, 3.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7774">https://access.redhat.com/security/cve/CVE-2020-7774</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0551.html">https://errata.almalinux.org/8/ALSA-2021-0551.html</a><br><a href="https://github.com/advisories/GHSA-c4w7-xm78-47vh">https://github.com/advisories/GHSA-c4w7-xm78-47vh</a><br><a href="https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25">https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25</a><br><a href="https://github.com/yargs/y18n/issues/96">https://github.com/yargs/y18n/issues/96</a><br><a href="https://github.com/yargs/y18n/pull/108">https://github.com/yargs/y18n/pull/108</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7774.html">https://linux.oracle.com/cve/CVE-2020-7774.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0551.html">https://linux.oracle.com/errata/ELSA-2021-0551.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">https://nvd.nist.gov/vuln/detail/CVE-2020-7774</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306</a><br><a href="https://snyk.io/vuln/SNYK-JS-Y18N-1021887">https://snyk.io/vuln/SNYK-JS-Y18N-1021887</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
|
||
| y18n | CVE-2020-7774 | HIGH | 4.0.0 | 5.0.5, 4.0.1, 3.2.2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7774">https://access.redhat.com/security/cve/CVE-2020-7774</a><br><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0551.html">https://errata.almalinux.org/8/ALSA-2021-0551.html</a><br><a href="https://github.com/advisories/GHSA-c4w7-xm78-47vh">https://github.com/advisories/GHSA-c4w7-xm78-47vh</a><br><a href="https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25">https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25</a><br><a href="https://github.com/yargs/y18n/issues/96">https://github.com/yargs/y18n/issues/96</a><br><a href="https://github.com/yargs/y18n/pull/108">https://github.com/yargs/y18n/pull/108</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7774.html">https://linux.oracle.com/cve/CVE-2020-7774.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0551.html">https://linux.oracle.com/errata/ELSA-2021-0551.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">https://nvd.nist.gov/vuln/detail/CVE-2020-7774</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306</a><br><a href="https://snyk.io/vuln/SNYK-JS-Y18N-1021887">https://snyk.io/vuln/SNYK-JS-Y18N-1021887</a><br><a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a><br></details> |
|
||
| yargs-parser | CVE-2020-7608 | MEDIUM | 10.1.0 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7608">https://access.redhat.com/security/cve/CVE-2020-7608</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0548.html">https://errata.almalinux.org/8/ALSA-2021-0548.html</a><br><a href="https://github.com/advisories/GHSA-p9pc-299p-vxgp">https://github.com/advisories/GHSA-p9pc-299p-vxgp</a><br><a href="https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2">https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7608.html">https://linux.oracle.com/cve/CVE-2020-7608.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0548.html">https://linux.oracle.com/errata/ELSA-2021-0548.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7608">https://nvd.nist.gov/vuln/detail/CVE-2020-7608</a><br><a href="https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381">https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381</a><br><a href="https://www.npmjs.com/advisories/1500">https://www.npmjs.com/advisories/1500</a><br></details> |
|
||
| yargs-parser | CVE-2020-7608 | MEDIUM | 11.1.1 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7608">https://access.redhat.com/security/cve/CVE-2020-7608</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0548.html">https://errata.almalinux.org/8/ALSA-2021-0548.html</a><br><a href="https://github.com/advisories/GHSA-p9pc-299p-vxgp">https://github.com/advisories/GHSA-p9pc-299p-vxgp</a><br><a href="https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2">https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7608.html">https://linux.oracle.com/cve/CVE-2020-7608.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0548.html">https://linux.oracle.com/errata/ELSA-2021-0548.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7608">https://nvd.nist.gov/vuln/detail/CVE-2020-7608</a><br><a href="https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381">https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381</a><br><a href="https://www.npmjs.com/advisories/1500">https://www.npmjs.com/advisories/1500</a><br></details> |
|
||
| yargs-parser | CVE-2020-7608 | MEDIUM | 7.0.0 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2020-7608">https://access.redhat.com/security/cve/CVE-2020-7608</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-0548.html">https://errata.almalinux.org/8/ALSA-2021-0548.html</a><br><a href="https://github.com/advisories/GHSA-p9pc-299p-vxgp">https://github.com/advisories/GHSA-p9pc-299p-vxgp</a><br><a href="https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2">https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2</a><br><a href="https://linux.oracle.com/cve/CVE-2020-7608.html">https://linux.oracle.com/cve/CVE-2020-7608.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-0548.html">https://linux.oracle.com/errata/ELSA-2021-0548.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7608">https://nvd.nist.gov/vuln/detail/CVE-2020-7608</a><br><a href="https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381">https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381</a><br><a href="https://www.npmjs.com/advisories/1500">https://www.npmjs.com/advisories/1500</a><br></details> |
|
||
|
||
**composer**
|
||
|
||
|
||
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|
||
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
|
||
| symfony/cache | CVE-2019-18889 | CRITICAL | v4.2.3 | 3.4.35, 4.1.0, 4.2.0, 4.2.12, 4.3.8, 3.2.0, 3.3.0, 3.4.0 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18889">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18889</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml</a><br><a href="https://github.com/advisories/GHSA-79gr-58r3-pwm3">https://github.com/advisories/GHSA-79gr-58r3-pwm3</a><br><a href="https://github.com/symfony/symfony/commit/8817d28fcaacb31fe01d267f6e19b44d8179395a">https://github.com/symfony/symfony/commit/8817d28fcaacb31fe01d267f6e19b44d8179395a</a><br><a href="https://github.com/symfony/symfony/releases/tag/v4.3.8">https://github.com/symfony/symfony/releases/tag/v4.3.8</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18889">https://nvd.nist.gov/vuln/detail/CVE-2019-18889</a><br><a href="https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances">https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances</a><br><a href="https://symfony.com/blog/symfony-4-3-8-released">https://symfony.com/blog/symfony-4-3-8-released</a><br><a href="https://symfony.com/cve-2019-18889">https://symfony.com/cve-2019-18889</a><br></details> |
|
||
| symfony/cache | CVE-2019-10912 | HIGH | v4.2.3 | 4.1.12, 4.2.7, 3.2.0, 3.3.0, 3.4.0, 3.4.26, 4.1.0 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10912">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10912</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml</a><br><a href="https://github.com/advisories/GHSA-w2fr-65vp-mxw3">https://github.com/advisories/GHSA-w2fr-65vp-mxw3</a><br><a href="https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b">https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10912">https://nvd.nist.gov/vuln/detail/CVE-2019-10912</a><br><a href="https://seclists.org/bugtraq/2019/May/21">https://seclists.org/bugtraq/2019/May/21</a><br><a href="https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized">https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized</a><br><a href="https://symfony.com/cve-2019-10912">https://symfony.com/cve-2019-10912</a><br><a href="https://typo3.org/security/advisory/typo3-core-sa-2019-016">https://typo3.org/security/advisory/typo3-core-sa-2019-016</a><br><a href="https://typo3.org/security/advisory/typo3-core-sa-2019-016/">https://typo3.org/security/advisory/typo3-core-sa-2019-016/</a><br><a href="https://www.debian.org/security/2019/dsa-4441">https://www.debian.org/security/2019/dsa-4441</a><br></details> |
|
||
| symfony/dependency-injection | CVE-2019-10910 | CRITICAL | v4.2.4 | 2.8.50, 3.1.0, 3.3.0, 3.4.0, 4.1.12, 4.2.7, 2.7.51, 3.2.0, 3.4.26, 4.1.0 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10910">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10910</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml</a><br><a href="https://github.com/advisories/GHSA-pgwj-prpq-jpc2">https://github.com/advisories/GHSA-pgwj-prpq-jpc2</a><br><a href="https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b">https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10910">https://nvd.nist.gov/vuln/detail/CVE-2019-10910</a><br><a href="https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid">https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid</a><br><a href="https://symfony.com/cve-2019-10910">https://symfony.com/cve-2019-10910</a><br><a href="https://www.drupal.org/SA-CORE-2019-005">https://www.drupal.org/SA-CORE-2019-005</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_19_19">https://www.synology.com/security/advisory/Synology_SA_19_19</a><br></details> |
|
||
| symfony/framework-bundle | CVE-2019-10909 | MEDIUM | v4.2.3 | 3.2.0, 3.3.0, 4.1.12, 4.2.7, 2.7.51, 2.8.50, 3.1.0, 3.4.0, 3.4.26, 4.1.0 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10909">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10909</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml</a><br><a href="https://github.com/advisories/GHSA-g996-q5r8-w7g2">https://github.com/advisories/GHSA-g996-q5r8-w7g2</a><br><a href="https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2">https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10909">https://nvd.nist.gov/vuln/detail/CVE-2019-10909</a><br><a href="https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine">https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine</a><br><a href="https://symfony.com/cve-2019-10909">https://symfony.com/cve-2019-10909</a><br><a href="https://www.drupal.org/SA-CORE-2019-005">https://www.drupal.org/SA-CORE-2019-005</a><br><a href="https://www.drupal.org/sa-core-2019-005">https://www.drupal.org/sa-core-2019-005</a><br><a href="https://www.synology.com/security/advisory/Synology_SA_19_19">https://www.synology.com/security/advisory/Synology_SA_19_19</a><br></details> |
|
||
| symfony/http-foundation | CVE-2019-10913 | CRITICAL | v4.2.4 | 2.7.51, 2.8.50, 3.1.0, 3.2.0, 3.4.0, 4.2.7, 3.3.0, 3.4.26, 4.1.0, 4.1.12 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10913">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10913</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml</a><br><a href="https://github.com/advisories/GHSA-x92h-wmg2-6hp7">https://github.com/advisories/GHSA-x92h-wmg2-6hp7</a><br><a href="https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec">https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10913">https://nvd.nist.gov/vuln/detail/CVE-2019-10913</a><br><a href="https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides">https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides</a><br><a href="https://symfony.com/cve-2019-10913">https://symfony.com/cve-2019-10913</a><br></details> |
|
||
| symfony/http-foundation | CVE-2019-18888 | HIGH | v4.2.4 | 2.5.0, 2.6.0, 3.2.0, 2.1.0, 2.4.0, 4.1.0, 4.2.12, 4.3.8, 2.2.0, 3.4.35, 2.8.0, 2.8.52, 3.1.0, 3.3.0, 3.4.0, 4.2.0, 2.3.0, 2.7.0 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml</a><br><a href="https://github.com/advisories/GHSA-xhh6-956q-4q69">https://github.com/advisories/GHSA-xhh6-956q-4q69</a><br><a href="https://github.com/symfony/symfony/commit/691486e43ce0e4893cd703e221bafc10a871f365">https://github.com/symfony/symfony/commit/691486e43ce0e4893cd703e221bafc10a871f365</a><br><a href="https://github.com/symfony/symfony/commit/77ddabf2e785ea85860d2720cc86f7c5d8967ed5">https://github.com/symfony/symfony/commit/77ddabf2e785ea85860d2720cc86f7c5d8967ed5</a><br><a href="https://github.com/symfony/symfony/releases/tag/v4.3.8">https://github.com/symfony/symfony/releases/tag/v4.3.8</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18888">https://nvd.nist.gov/vuln/detail/CVE-2019-18888</a><br><a href="https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser">https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser</a><br><a href="https://symfony.com/blog/symfony-4-3-8-released">https://symfony.com/blog/symfony-4-3-8-released</a><br><a href="https://symfony.com/cve-2019-18888">https://symfony.com/cve-2019-18888</a><br></details> |
|
||
| symfony/http-kernel | CVE-2019-18887 | HIGH | v4.2.4 | 3.1.0, 4.1.0, 4.3.8, 2.3.0, 2.5.0, 2.7.0, 2.8.52, 2.4.0, 2.6.0, 2.8.0, 4.2.12, 3.2.0, 3.4.0, 4.2.0, 3.3.0, 3.4.35 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18887">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18887</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18887.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18887.yaml</a><br><a href="https://github.com/advisories/GHSA-q8hg-pf8v-cxrv">https://github.com/advisories/GHSA-q8hg-pf8v-cxrv</a><br><a href="https://github.com/symfony/symfony/commit/cccefe6a7f12e776df0665aeb77fe9294c285fbb">https://github.com/symfony/symfony/commit/cccefe6a7f12e776df0665aeb77fe9294c285fbb</a><br><a href="https://github.com/symfony/symfony/releases/tag/v4.3.8">https://github.com/symfony/symfony/releases/tag/v4.3.8</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18887">https://nvd.nist.gov/vuln/detail/CVE-2019-18887</a><br><a href="https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner">https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner</a><br><a href="https://symfony.com/blog/symfony-4-3-8-released">https://symfony.com/blog/symfony-4-3-8-released</a><br><a href="https://symfony.com/cve-2019-18887">https://symfony.com/cve-2019-18887</a><br></details> |
|
||
| symfony/var-exporter | CVE-2019-11325 | CRITICAL | v4.2.3 | 4.2.12, 4.3.8 | <details><summary>Expand...</summary><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml</a><br><a href="https://github.com/advisories/GHSA-w4rc-rx25-8m86">https://github.com/advisories/GHSA-w4rc-rx25-8m86</a><br><a href="https://github.com/symfony/symfony/releases/tag/v4.3.8">https://github.com/symfony/symfony/releases/tag/v4.3.8</a><br><a href="https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3">https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11325">https://nvd.nist.gov/vuln/detail/CVE-2019-11325</a><br><a href="https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter">https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter</a><br><a href="https://symfony.com/blog/symfony-4-3-8-released">https://symfony.com/blog/symfony-4-3-8-released</a><br><a href="https://symfony.com/cve-2019-11325">https://symfony.com/cve-2019-11325</a><br></details> |
|
||
| twig/twig | CVE-2022-23614 | CRITICAL | v2.6.2 | 2.14.11, 3.3.8 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-23614">https://access.redhat.com/security/cve/CVE-2022-23614</a><br><a href="https://github.com/advisories/GHSA-5mv2-rx3q-4w2v">https://github.com/advisories/GHSA-5mv2-rx3q-4w2v</a><br><a href="https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9">https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9</a><br><a href="https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5">https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5</a><br><a href="https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v">https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2PVV5DUTRUECTIHMTWRI5Z7DVNYQ2YO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTN4273U4RHVIXED64T7DSMJ3VYTPRE7/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIGZCFSYLPP7UVJ4E4NLHSOQSKYNXSAD/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23614">https://nvd.nist.gov/vuln/detail/CVE-2022-23614</a><br><a href="https://symfony.com/blog/twig-security-release-disallow-non-closures-in-the-sort-filter">https://symfony.com/blog/twig-security-release-disallow-non-closures-in-the-sort-filter</a><br><a href="https://www.debian.org/security/2022/dsa-5107">https://www.debian.org/security/2022/dsa-5107</a><br></details> |
|
||
| twig/twig | CVE-2019-9942 | LOW | v2.6.2 | 1.38.0, 2.7.0 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9942</a><br><a href="https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml">https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml</a><br><a href="https://github.com/advisories/GHSA-vxrc-68xx-x48g">https://github.com/advisories/GHSA-vxrc-68xx-x48g</a><br><a href="https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077">https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9942">https://nvd.nist.gov/vuln/detail/CVE-2019-9942</a><br><a href="https://seclists.org/bugtraq/2019/Mar/60">https://seclists.org/bugtraq/2019/Mar/60</a><br><a href="https://symfony.com/blog/twig-sandbox-information-disclosure">https://symfony.com/blog/twig-sandbox-information-disclosure</a><br><a href="https://www.debian.org/security/2019/dsa-4419">https://www.debian.org/security/2019/dsa-4419</a><br></details> |
|