Commit new App releases for TrueCharts

Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
TrueCharts-Bot 2022-07-09 19:35:57 +00:00
parent 2fc006af0d
commit f15a360ed8
247 changed files with 14826 additions and 8259 deletions

View File

@ -1,288 +0,0 @@
---
hide:
- toc
---
# Security Overview
<link href="https://truecharts.org/_static/trivy.css" type="text/css" rel="stylesheet" />
## Helm-Chart
##### Scan Results
#### Chart Object: adguard-home/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;RELEASE-NAME-adguard-home&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;RELEASE-NAME-adguard-home&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;RELEASE-NAME-adguard-home&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv012">https://avd.aquasec.com/misconfig/ksv012</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv012">https://avd.aquasec.com/misconfig/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;RELEASE-NAME-adguard-home&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/misconfig/ksv017">https://avd.aquasec.com/misconfig/ksv017</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-adguard-home&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-adguard-home&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-adguard-home&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set &#39;securityContext.seccompProfile.type&#39; to &#39;RuntimeDefault&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set &#39;securityContext.seccompProfile.type&#39; to &#39;RuntimeDefault&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root UID. <br> <hr> <br> securityContext.runAsUser should be set to a value greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv105">https://avd.aquasec.com/misconfig/ksv105</a><br></details> |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root UID. <br> <hr> <br> securityContext.runAsUser should be set to a value greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv105">https://avd.aquasec.com/misconfig/ksv105</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
## Containers
##### Detected Containers
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
tccr.io/truecharts/adguard-home:v0.107.7@sha256:05ff4b98ef1e049da92b6561f418a27e9aafcfe06a44cec804dc93f48d340de8
##### Scan Results
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
**ubuntu**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1586">https://access.redhat.com/security/cve/CVE-2022-1586</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077976,">https://bugzilla.redhat.com/show_bug.cgi?id=2077976,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,">https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c">https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1586.html">https://linux.oracle.com/cve/CVE-2022-1586.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">https://nvd.nist.gov/vuln/detail/CVE-2022-1586</a><br></details> |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1587">https://access.redhat.com/security/cve/CVE-2022-1587</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077983,">https://bugzilla.redhat.com/show_bug.cgi?id=2077983,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0">https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1587.html">https://linux.oracle.com/cve/CVE-2022-1587.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">https://nvd.nist.gov/vuln/detail/CVE-2022-1587</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/HT211168">https://support.apple.com/HT211168</a><br><a href="https://support.apple.com/HT211170">https://support.apple.com/HT211170</a><br><a href="https://support.apple.com/HT211171">https://support.apple.com/HT211171</a><br><a href="https://support.apple.com/HT211175">https://support.apple.com/HT211175</a><br><a href="https://support.apple.com/HT211178">https://support.apple.com/HT211178</a><br><a href="https://support.apple.com/HT211179">https://support.apple.com/HT211179</a><br><a href="https://support.apple.com/HT211181">https://support.apple.com/HT211181</a><br><a href="https://vuldb.com/?id.155768">https://vuldb.com/?id.155768</a><br></details> |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/en-us/HT211935">https://support.apple.com/en-us/HT211935</a><br><a href="https://support.apple.com/en-us/HT211952">https://support.apple.com/en-us/HT211952</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details> |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211847">https://support.apple.com/en-us/HT211847</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/kb/HT211846">https://support.apple.com/kb/HT211846</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details> |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">https://nvd.nist.gov/vuln/detail/CVE-2022-2068</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.debian.org/security/2022/dsa-5169">https://www.debian.org/security/2022/dsa-5169</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">https://nvd.nist.gov/vuln/detail/CVE-2022-2068</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.debian.org/security/2022/dsa-5169">https://www.debian.org/security/2022/dsa-5169</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14147">https://access.redhat.com/security/cve/CVE-2020-14147</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147</a><br><a href="https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571">https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571</a><br><a href="https://github.com/antirez/redis/pull/6875">https://github.com/antirez/redis/pull/6875</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14147">https://nvd.nist.gov/vuln/detail/CVE-2020-14147</a><br><a href="https://security.gentoo.org/glsa/202008-17">https://security.gentoo.org/glsa/202008-17</a><br><a href="https://www.debian.org/security/2020/dsa-4731">https://www.debian.org/security/2020/dsa-4731</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details> |
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32626">https://access.redhat.com/security/cve/CVE-2021-32626</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591">https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c">https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32626.html">https://linux.oracle.com/cve/CVE-2021-32626.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E">https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">https://nvd.nist.gov/vuln/detail/CVE-2021-32626</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32627">https://access.redhat.com/security/cve/CVE-2021-32627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v">https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32627.html">https://linux.oracle.com/cve/CVE-2021-32627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">https://nvd.nist.gov/vuln/detail/CVE-2021-32627</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32628">https://access.redhat.com/security/cve/CVE-2021-32628</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr">https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32628.html">https://linux.oracle.com/cve/CVE-2021-32628.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">https://nvd.nist.gov/vuln/detail/CVE-2021-32628</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32672">https://access.redhat.com/security/cve/CVE-2021-32672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672</a><br><a href="https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd">https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm">https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">https://nvd.nist.gov/vuln/detail/CVE-2021-32672</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32675">https://access.redhat.com/security/cve/CVE-2021-32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8">https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32675.html">https://linux.oracle.com/cve/CVE-2021-32675.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E">https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">https://nvd.nist.gov/vuln/detail/CVE-2021-32675</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32687">https://access.redhat.com/security/cve/CVE-2021-32687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f">https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q">https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32687.html">https://linux.oracle.com/cve/CVE-2021-32687.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">https://nvd.nist.gov/vuln/detail/CVE-2021-32687</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41099">https://access.redhat.com/security/cve/CVE-2021-41099</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521">https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph">https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41099.html">https://linux.oracle.com/cve/CVE-2021-41099.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">https://nvd.nist.gov/vuln/detail/CVE-2021-41099</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14147">https://access.redhat.com/security/cve/CVE-2020-14147</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147</a><br><a href="https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571">https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571</a><br><a href="https://github.com/antirez/redis/pull/6875">https://github.com/antirez/redis/pull/6875</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14147">https://nvd.nist.gov/vuln/detail/CVE-2020-14147</a><br><a href="https://security.gentoo.org/glsa/202008-17">https://security.gentoo.org/glsa/202008-17</a><br><a href="https://www.debian.org/security/2020/dsa-4731">https://www.debian.org/security/2020/dsa-4731</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details> |
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32626">https://access.redhat.com/security/cve/CVE-2021-32626</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591">https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c">https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32626.html">https://linux.oracle.com/cve/CVE-2021-32626.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E">https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">https://nvd.nist.gov/vuln/detail/CVE-2021-32626</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32627">https://access.redhat.com/security/cve/CVE-2021-32627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v">https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32627.html">https://linux.oracle.com/cve/CVE-2021-32627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">https://nvd.nist.gov/vuln/detail/CVE-2021-32627</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32628">https://access.redhat.com/security/cve/CVE-2021-32628</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr">https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32628.html">https://linux.oracle.com/cve/CVE-2021-32628.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">https://nvd.nist.gov/vuln/detail/CVE-2021-32628</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32672">https://access.redhat.com/security/cve/CVE-2021-32672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672</a><br><a href="https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd">https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm">https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">https://nvd.nist.gov/vuln/detail/CVE-2021-32672</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32675">https://access.redhat.com/security/cve/CVE-2021-32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8">https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32675.html">https://linux.oracle.com/cve/CVE-2021-32675.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E">https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">https://nvd.nist.gov/vuln/detail/CVE-2021-32675</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32687">https://access.redhat.com/security/cve/CVE-2021-32687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f">https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q">https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32687.html">https://linux.oracle.com/cve/CVE-2021-32687.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">https://nvd.nist.gov/vuln/detail/CVE-2021-32687</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41099">https://access.redhat.com/security/cve/CVE-2021-41099</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521">https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph">https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41099.html">https://linux.oracle.com/cve/CVE-2021-41099.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">https://nvd.nist.gov/vuln/detail/CVE-2021-41099</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-31879">https://access.redhat.com/security/cve/CVE-2021-31879</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31879">https://nvd.nist.gov/vuln/detail/CVE-2021-31879</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
#### Container: tccr.io/truecharts/adguard-home:v0.107.7@sha256:05ff4b98ef1e049da92b6561f418a27e9aafcfe06a44cec804dc93f48d340de8 (alpine 3.13.10)
**alpine**
| No Vulnerabilities found |
|:---------------------------------|
**gobinary**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| github.com/kardianos/service | CVE-2022-29583 | HIGH | v1.2.1 | | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-xm99-6pv5-q363">https://github.com/advisories/GHSA-xm99-6pv5-q363</a><br><a href="https://github.com/kardianos/service/pull/290">https://github.com/kardianos/service/pull/290</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29583">https://nvd.nist.gov/vuln/detail/CVE-2022-29583</a><br></details> |

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="adguard-home-1.0.9"></a>
### [adguard-home-1.0.9](https://github.com/truecharts/apps/compare/adguard-home-1.0.8...adguard-home-1.0.9) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="adguard-home-1.0.8"></a>
### [adguard-home-1.0.8](https://github.com/truecharts/apps/compare/adguard-home-1.0.7...adguard-home-1.0.8) (2022-07-04)
@ -88,8 +97,3 @@
#### Chore
* sync all apps persistence configuration and always default to PVC
#### Refactor
* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836))

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-07T18:02:54.611235815Z"
generated: "2022-07-09T19:30:37.857224489Z"

View File

@ -18,7 +18,7 @@ maintainers:
name: adguard-home
sources:
- https://hub.docker.com/r/adguard/adguardhome
version: 1.0.8
version: 1.0.9
annotations:
truecharts.org/catagories: |
- media

View File

@ -18,38 +18,29 @@ service:
main:
port: 10232
targetPort: 3000
dns-tcp:
dns:
enabled: true
ports:
dns-tcp:
enabled: true
port: 53
targetPort: 53
dns-udp:
enabled: true
ports:
dns-udp:
enabled: true
protocol: UDP
port: 53
targetPort: 53
dns-http:
dns-doh:
enabled: true
ports:
dns-http:
enabled: true
port: 10233
targetPort: 80
dns-https:
enabled: true
ports:
dns-https:
enabled: true
port: 10234
targetPort: 443
dns-https-udp:
enabled: true
ports:
dns-https-udp:
enabled: true
protocol: UDP
@ -58,19 +49,16 @@ service:
dns-crypt:
enabled: true
ports:
dns-crypt:
dns-crypt-tcp:
enabled: true
port: 5443
targetPort: 5443
dns-crypt-udp:
enabled: true
ports:
dns-crypt-udp:
enabled: true
protocol: UDP
port: 5443
targetPort: 5443
dns-quic-udp-1:
dns-quic:
enabled: true
ports:
dns-quic-udp-1:
@ -78,17 +66,11 @@ service:
protocol: UDP
port: 784
targetPort: 784
dns-quic-udp-2:
enabled: true
ports:
dns-quic-udp-2:
enabled: true
protocol: UDP
port: 853
targetPort: 853
dns-quic-udp-3:
enabled: true
ports:
dns-quic-udp-3:
enabled: true
protocol: UDP

View File

@ -411,9 +411,9 @@ questions:
schema:
type: int
default: 3000
- variable: dns-tcp
label: "dns-tcp Service"
description: "dns-tcp service"
- variable: dns
label: "DNS Service"
description: "DNS service"
schema:
additional_attrs: true
type: dict
@ -537,85 +537,6 @@ questions:
schema:
type: int
default: 53
- variable: dns-udp
label: "dns-udp Service"
description: "dns-udp service"
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-udp
label: "dns-udp Service Port Configuration"
schema:
@ -663,9 +584,9 @@ questions:
schema:
type: int
default: 53
- variable: dns-http
label: "dns-http Service"
description: "The dns-http service."
- variable: dns-doh
label: "dns-doh Service"
description: "The dns-doh service."
schema:
additional_attrs: true
type: dict
@ -789,85 +710,6 @@ questions:
schema:
type: int
default: 80
- variable: dns-https
label: "dns-https Service"
description: "The dns-https service."
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-https
label: "dns-https Service Port Configuration"
schema:
@ -892,7 +734,7 @@ questions:
label: "Port Type"
schema:
type: string
default: "HTTP"
default: "HTTPS"
enum:
- value: HTTP
description: "HTTP"
@ -915,85 +757,6 @@ questions:
schema:
type: int
default: 443
- variable: dns-https-udp
label: "dns-https-udp Service"
description: "The dns-https-udp service."
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-https-udp
label: "dns-https-udp Service Port Configuration"
schema:
@ -1120,8 +883,8 @@ questions:
additional_attrs: true
type: dict
attrs:
- variable: dns-crypt
label: "dns-crypt Service Port Configuration"
- variable: dns-crypt-tcp
label: "dns-crypt-tcp Service Port Configuration"
schema:
additional_attrs: true
type: dict
@ -1144,7 +907,7 @@ questions:
label: "Port Type"
schema:
type: string
default: "HTTP"
default: "TCP"
enum:
- value: HTTP
description: "HTTP"
@ -1167,85 +930,6 @@ questions:
schema:
type: int
default: 5443
- variable: dns-crypt-udp
label: "dns-crypt-udp Service"
description: "The dns-crypt-udp service."
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-crypt-udp
label: "dns-crypt-udp Service Port Configuration"
schema:
@ -1293,9 +977,9 @@ questions:
schema:
type: int
default: 5443
- variable: dns-quic-udp-1
label: "dns-quic-udp-1 Service"
description: "The dns-quic-udp-1 service."
- variable: dns-quic
label: "dns-quic Service"
description: "The dns-quic service."
schema:
additional_attrs: true
type: dict
@ -1419,85 +1103,6 @@ questions:
schema:
type: int
default: 784
- variable: dns-quic-udp-2
label: "dns-quic-udp-2 Service"
description: "The dns-quic-udp-2 service."
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-quic-udp-2
label: "dns-quic-udp-2 Service Port Configuration"
schema:
@ -1545,85 +1150,6 @@ questions:
schema:
type: int
default: 853
- variable: dns-quic-udp-3
label: "dns-quic-udp-3 Service"
description: "The dns-quic-udp-3 service."
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-quic-udp-3
label: "dns-quic-udp-3 Service Port Configuration"
schema:

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="cloudflared-0.0.5"></a>
### [cloudflared-0.0.5](https://github.com/truecharts/apps/compare/cloudflared-0.0.4...cloudflared-0.0.5) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="cloudflared-0.0.4"></a>
### [cloudflared-0.0.4](https://github.com/truecharts/apps/compare/cloudflared-0.0.3...cloudflared-0.0.4) (2022-07-07)

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-04T19:51:46.110089821Z"
generated: "2022-07-09T19:30:37.795086486Z"

View File

@ -1,7 +1,7 @@
apiVersion: v2
kubeVersion: ">=1.16.0-0"
name: cloudflared
version: 0.0.4
version: 0.0.5
appVersion: "2022.7.1"
description: Client for Cloudflare Tunnel, a daemon that exposes private services through the Cloudflare edge.
type: application

View File

@ -17,9 +17,9 @@ podSecurityContext:
service:
main:
protocol: HTTP
ports:
main:
protocol: HTTP
targetPort: 6969
port: 6969

File diff suppressed because one or more lines are too long

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="etesync-0.0.5"></a>
### [etesync-0.0.5](https://github.com/truecharts/apps/compare/etesync-0.0.4...etesync-0.0.5) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="etesync-0.0.4"></a>
### [etesync-0.0.4](https://github.com/truecharts/apps/compare/etesync-0.0.3...etesync-0.0.4) (2022-07-05)

View File

@ -6,4 +6,4 @@ dependencies:
repository: https://charts.truecharts.org/
version: 8.0.22
digest: sha256:1a1f3a6b3974254474382885532227cdf18d8d10f2f60fb49cf5ba74b915b176
generated: "2022-07-05T20:02:41.355264244Z"
generated: "2022-07-09T19:30:42.614740938Z"

View File

@ -31,7 +31,7 @@ sources:
- https://github.com/victor-rds/docker-etebase
- https://hub.docker.com/r/victorrds/etesync
type: application
version: 0.0.4
version: 0.0.5
annotations:
truecharts.org/catagories: |
- productivity

View File

@ -50,9 +50,9 @@ secretEnv:
service:
main:
protocol: HTTP
ports:
main:
protocol: HTTP
targetPort: 3735
port: 10254

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="homebridge-1.0.10"></a>
### [homebridge-1.0.10](https://github.com/truecharts/apps/compare/homebridge-1.0.9...homebridge-1.0.10) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="homebridge-1.0.9"></a>
### [homebridge-1.0.9](https://github.com/truecharts/apps/compare/homebridge-1.0.8...homebridge-1.0.9) (2022-07-04)
@ -88,12 +97,3 @@
#### Refactor
* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836))
<a name="homebridge-1.0.0"></a>
### [homebridge-1.0.0](https://github.com/truecharts/apps/compare/homebridge-0.0.20...homebridge-1.0.0) (2022-06-07)
#### Chore
* sync all apps persistence configuration and always default to PVC

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-04T20:01:14.560051037Z"
generated: "2022-07-09T19:30:37.839234101Z"

View File

@ -21,7 +21,7 @@ sources:
- https://homebridge.io/
- https://github.com/oznu/docker-homebridge
type: application
version: 1.0.9
version: 1.0.10
annotations:
truecharts.org/catagories: |
- media

View File

@ -5,9 +5,9 @@ image:
service:
main:
protocol: HTTP
ports:
main:
protocol: HTTP
targetPort: 8581
port: 8581

View File

@ -1,7 +0,0 @@
# Configuration Options
##### Connecting to other apps
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide.
##### Available config options
In the future this page is going to contain an automated list of options available in the installation/edit UI.

View File

@ -1,28 +0,0 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| env | object | See below | environment variables. See [image docs](https://github.com/oznu/docker-homebridge#parameters) for more details. |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/homebridge"` | |
| image.tag | string | `"v2022-02@sha256:a6b5e77d71f6cf8ab608ec96a34342a038dd8b5d8ef799108455622ad68bb7e8"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/homebridge"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `false` | |
| service.main.ports.main.port | int | `8581` | |
| service.main.ports.main.targetPort | int | `8581` | |
| service.main.protocol | string | `"HTTP"` | |
All Rights Reserved - The TrueCharts Project

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="privatebin-0.0.8"></a>
### [privatebin-0.0.8](https://github.com/truecharts/apps/compare/privatebin-0.0.7...privatebin-0.0.8) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="privatebin-0.0.7"></a>
### [privatebin-0.0.7](https://github.com/truecharts/apps/compare/privatebin-0.0.6...privatebin-0.0.7) (2022-07-05)

View File

@ -6,4 +6,4 @@ dependencies:
repository: https://charts.truecharts.org/
version: 8.0.22
digest: sha256:1a1f3a6b3974254474382885532227cdf18d8d10f2f60fb49cf5ba74b915b176
generated: "2022-07-05T19:57:43.787168249Z"
generated: "2022-07-09T19:30:58.180738724Z"

View File

@ -26,7 +26,7 @@ sources:
- https://github.com/PrivateBin/PrivateBin
- https://hub.docker.com/r/privatebin/pdo
type: application
version: 0.0.7
version: 0.0.8
annotations:
truecharts.org/catagories: |
- productivity

View File

@ -50,9 +50,9 @@ env:
service:
main:
protocol: HTTP
ports:
main:
protocol: HTTP
targetPort: 8080
port: 10248

View File

@ -1,304 +0,0 @@
---
hide:
- toc
---
# Security Overview
<link href="https://truecharts.org/_static/trivy.css" type="text/css" rel="stylesheet" />
## Helm-Chart
##### Scan Results
#### Chart Object: radicale/templates/common.yaml
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;RELEASE-NAME-radicale&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.allowPrivilegeEscalation&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv001">https://avd.aquasec.com/misconfig/ksv001</a><br></details> |
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should add &#39;ALL&#39; to &#39;securityContext.capabilities.drop&#39; </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/misconfig/ksv003">https://avd.aquasec.com/misconfig/ksv003</a><br></details> |
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> &#39;runAsNonRoot&#39; forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.runAsNonRoot&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv012">https://avd.aquasec.com/misconfig/ksv012</a><br></details> |
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.readOnlyRootFilesystem&#39; to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/misconfig/ksv014">https://avd.aquasec.com/misconfig/ksv014</a><br></details> |
| Kubernetes Security Check | KSV017 | Privileged container | HIGH | <details><summary>Expand...</summary> Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.privileged&#39; to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/misconfig/ksv017">https://avd.aquasec.com/misconfig/ksv017</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-radicale&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW | <details><summary>Expand...</summary> Force the container to run with user ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.runAsUser&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv020">https://avd.aquasec.com/misconfig/ksv020</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;RELEASE-NAME-radicale&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW | <details><summary>Expand...</summary> Force the container to run with group ID &gt; 10000 to avoid conflicts with the hosts user table. <br> <hr> <br> Container &#39;prepare&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should set &#39;securityContext.runAsGroup&#39; &gt; 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/misconfig/ksv021">https://avd.aquasec.com/misconfig/ksv021</a><br></details> |
| Kubernetes Security Check | KSV022 | Non-default capabilities added | MEDIUM | <details><summary>Expand...</summary> Adding NET_RAW or capabilities beyond the default set must be disallowed. <br> <hr> <br> Container &#39;RELEASE-NAME-radicale&#39; of Deployment &#39;RELEASE-NAME-radicale&#39; should not set &#39;securityContext.capabilities.add&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline">https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline</a><br><a href="https://avd.aquasec.com/misconfig/ksv022">https://avd.aquasec.com/misconfig/ksv022</a><br></details> |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set &#39;securityContext.seccompProfile.type&#39; to &#39;RuntimeDefault&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW | <details><summary>Expand...</summary> The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles. <br> <hr> <br> Either Pod or Container should set &#39;securityContext.seccompProfile.type&#39; to &#39;RuntimeDefault&#39; </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv030">https://avd.aquasec.com/misconfig/ksv030</a><br></details> |
| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root UID. <br> <hr> <br> securityContext.runAsUser should be set to a value greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv105">https://avd.aquasec.com/misconfig/ksv105</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should drop all </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW | <details><summary>Expand...</summary> Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability. <br> <hr> <br> container should not add stuff </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/misconfig/ksv106">https://avd.aquasec.com/misconfig/ksv106</a><br></details> |
## Containers
##### Detected Containers
tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367
tomsquest/docker-radicale:3.1.7.0@sha256:c182c596c8bc869003845a594ea4242c506ae77d661e9e2511398389785cb9ec
##### Scan Results
#### Container: tccr.io/truecharts/multi-init:v0.0.1@sha256:41185dcea1e6f6a035d8090da40aecc6a69cef66b91dc1332a90c9d22861d367 (ubuntu 20.04)
**ubuntu**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | <details><summary>Expand...</summary><a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a><br><a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a><br><a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a><br></details> |
| curl | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| curl | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libcurl4 | CVE-2022-32206 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| libcurl4 | CVE-2022-32208 | MEDIUM | 7.68.0-1ubuntu2.11 | 7.68.0-1ubuntu2.12 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-43618">https://access.redhat.com/security/cve/CVE-2021-43618</a><br><a href="https://bugs.debian.org/994405">https://bugs.debian.org/994405</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618</a><br><a href="https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html">https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html</a><br><a href="https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e">https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html">https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">https://nvd.nist.gov/vuln/detail/CVE-2021-43618</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-36222">https://access.redhat.com/security/cve/CVE-2021-36222</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222</a><br><a href="https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562">https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-36222.html">https://linux.oracle.com/cve/CVE-2021-36222.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3576.html">https://linux.oracle.com/errata/ELSA-2021-3576.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">https://nvd.nist.gov/vuln/detail/CVE-2021-36222</a><br><a href="https://security.netapp.com/advisory/ntap-20211022-0003/">https://security.netapp.com/advisory/ntap-20211022-0003/</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0007/">https://security.netapp.com/advisory/ntap-20211104-0007/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br><a href="https://www.debian.org/security/2021/dsa-4944">https://www.debian.org/security/2021/dsa-4944</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-37750">https://access.redhat.com/security/cve/CVE-2021-37750</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750</a><br><a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a><br><a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a><br><a href="https://linux.oracle.com/cve/CVE-2021-37750.html">https://linux.oracle.com/cve/CVE-2021-37750.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4788.html">https://linux.oracle.com/errata/ELSA-2021-4788.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">https://nvd.nist.gov/vuln/detail/CVE-2021-37750</a><br><a href="https://security.netapp.com/advisory/ntap-20210923-0002/">https://security.netapp.com/advisory/ntap-20210923-0002/</a><br><a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a><br></details> |
| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1586">https://access.redhat.com/security/cve/CVE-2022-1586</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077976,">https://bugzilla.redhat.com/show_bug.cgi?id=2077976,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,">https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c">https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1586.html">https://linux.oracle.com/cve/CVE-2022-1586.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">https://nvd.nist.gov/vuln/detail/CVE-2022-1586</a><br></details> |
| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1587">https://access.redhat.com/security/cve/CVE-2022-1587</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077983,">https://bugzilla.redhat.com/show_bug.cgi?id=2077983,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0">https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1587.html">https://linux.oracle.com/cve/CVE-2022-1587.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">https://nvd.nist.gov/vuln/detail/CVE-2022-1587</a><br></details> |
| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a><br><a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a><br><a href="https://access.redhat.com/security/cve/CVE-2017-11164">https://access.redhat.com/security/cve/CVE-2017-11164</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
| libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/HT211168">https://support.apple.com/HT211168</a><br><a href="https://support.apple.com/HT211170">https://support.apple.com/HT211170</a><br><a href="https://support.apple.com/HT211171">https://support.apple.com/HT211171</a><br><a href="https://support.apple.com/HT211175">https://support.apple.com/HT211175</a><br><a href="https://support.apple.com/HT211178">https://support.apple.com/HT211178</a><br><a href="https://support.apple.com/HT211179">https://support.apple.com/HT211179</a><br><a href="https://support.apple.com/HT211181">https://support.apple.com/HT211181</a><br><a href="https://vuldb.com/?id.155768">https://vuldb.com/?id.155768</a><br></details> |
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/en-us/HT211935">https://support.apple.com/en-us/HT211935</a><br><a href="https://support.apple.com/en-us/HT211952">https://support.apple.com/en-us/HT211952</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/</a><br></details> |
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://support.apple.com/en-us/HT211843">https://support.apple.com/en-us/HT211843</a><br><a href="https://support.apple.com/en-us/HT211844">https://support.apple.com/en-us/HT211844</a><br><a href="https://support.apple.com/en-us/HT211847">https://support.apple.com/en-us/HT211847</a><br><a href="https://support.apple.com/en-us/HT211850">https://support.apple.com/en-us/HT211850</a><br><a href="https://support.apple.com/en-us/HT211931">https://support.apple.com/en-us/HT211931</a><br><a href="https://support.apple.com/kb/HT211846">https://support.apple.com/kb/HT211846</a><br><a href="https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/">https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/</a><br></details> |
| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">https://nvd.nist.gov/vuln/detail/CVE-2022-2068</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.debian.org/security/2022/dsa-5169">https://www.debian.org/security/2022/dsa-5169</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-3671">https://access.redhat.com/security/cve/CVE-2021-3671</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2013080,">https://bugzilla.redhat.com/show_bug.cgi?id=2013080,</a><br><a href="https://bugzilla.samba.org/show_bug.cgi?id=14770,">https://bugzilla.samba.org/show_bug.cgi?id=14770,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671</a><br><a href="https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a">https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3671">https://nvd.nist.gov/vuln/detail/CVE-2021-3671</a><br><a href="https://ubuntu.com/security/notices/USN-5142-1">https://ubuntu.com/security/notices/USN-5142-1</a><br><a href="https://ubuntu.com/security/notices/USN-5174-1">https://ubuntu.com/security/notices/USN-5174-1</a><br></details> |
| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | | <details><summary>Expand...</summary><a href="https://akkadia.org/drepper/SHA-crypt.txt">https://akkadia.org/drepper/SHA-crypt.txt</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013</a><br><a href="https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/">https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/</a><br><a href="https://twitter.com/solardiz/status/795601240151457793">https://twitter.com/solardiz/status/795601240151457793</a><br></details> |
| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1304">https://access.redhat.com/security/cve/CVE-2022-1304</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2069726">https://bugzilla.redhat.com/show_bug.cgi?id=2069726</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304</a><br><a href="https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2">https://marc.info/?l=linux-ext4&amp;m=165056234501732&amp;w=2</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">https://nvd.nist.gov/vuln/detail/CVE-2022-1304</a><br><a href="https://ubuntu.com/security/notices/USN-5464-1">https://ubuntu.com/security/notices/USN-5464-1</a><br></details> |
| mariadb-client | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-client-core-10.3 | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-27928 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html">http://packetstormsecurity.com/files/162177/MariaDB-10.2-Command-Execution.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-27928">https://access.redhat.com/security/cve/CVE-2021-27928</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928</a><br><a href="https://jira.mariadb.org/browse/MDEV-25179">https://jira.mariadb.org/browse/MDEV-25179</a><br><a href="https://linux.oracle.com/cve/CVE-2021-27928.html">https://linux.oracle.com/cve/CVE-2021-27928.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-1242.html">https://linux.oracle.com/errata/ELSA-2021-1242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00028.html</a><br><a href="https://mariadb.com/kb/en/mariadb-10237-release-notes/">https://mariadb.com/kb/en/mariadb-10237-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10328-release-notes/">https://mariadb.com/kb/en/mariadb-10328-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-10418-release-notes/">https://mariadb.com/kb/en/mariadb-10418-release-notes/</a><br><a href="https://mariadb.com/kb/en/mariadb-1059-release-notes/">https://mariadb.com/kb/en/mariadb-1059-release-notes/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27928">https://nvd.nist.gov/vuln/detail/CVE-2021-27928</a><br><a href="https://security.gentoo.org/glsa/202105-28">https://security.gentoo.org/glsa/202105-28</a><br></details> |
| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46662">https://access.redhat.com/security/cve/CVE-2021-46662</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662</a><br><a href="https://jira.mariadb.org/browse/MDEV-22464">https://jira.mariadb.org/browse/MDEV-22464</a><br><a href="https://jira.mariadb.org/browse/MDEV-25637">https://jira.mariadb.org/browse/MDEV-25637</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46662.html">https://linux.oracle.com/cve/CVE-2021-46662.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">https://nvd.nist.gov/vuln/detail/CVE-2021-46662</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-46666 | MEDIUM | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46666">https://access.redhat.com/security/cve/CVE-2021-46666</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666</a><br><a href="https://jira.mariadb.org/browse/MDEV-25635">https://jira.mariadb.org/browse/MDEV-25635</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46666.html">https://linux.oracle.com/cve/CVE-2021-46666.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">https://nvd.nist.gov/vuln/detail/CVE-2021-46666</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-46667 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46667">https://access.redhat.com/security/cve/CVE-2021-46667</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667</a><br><a href="https://jira.mariadb.org/browse/MDEV-26350">https://jira.mariadb.org/browse/MDEV-26350</a><br><a href="https://linux.oracle.com/cve/CVE-2021-46667.html">https://linux.oracle.com/cve/CVE-2021-46667.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-1557.html">https://linux.oracle.com/errata/ELSA-2022-1557.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">https://nvd.nist.gov/vuln/detail/CVE-2021-46667</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| mariadb-common | CVE-2021-46669 | LOW | 1:10.3.34-0ubuntu0.20.04.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-46669">https://access.redhat.com/security/cve/CVE-2021-46669</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669</a><br><a href="https://jira.mariadb.org/browse/MDEV-25638">https://jira.mariadb.org/browse/MDEV-25638</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/</a><br><a href="https://mariadb.com/kb/en/security/">https://mariadb.com/kb/en/security/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">https://nvd.nist.gov/vuln/detail/CVE-2021-46669</a><br><a href="https://security.netapp.com/advisory/ntap-20220221-0002/">https://security.netapp.com/advisory/ntap-20220221-0002/</a><br></details> |
| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup">http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&amp;content-type=text/x-cvsweb-markup</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-39537">https://access.redhat.com/security/cve/CVE-2021-39537</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html">https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">https://nvd.nist.gov/vuln/detail/CVE-2021-39537</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-29458">https://access.redhat.com/security/cve/CVE-2022-29458</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458</a><br><a href="https://invisible-island.net/ncurses/NEWS.html#t20220416">https://invisible-island.net/ncurses/NEWS.html#t20220416</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html">https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">https://nvd.nist.gov/vuln/detail/CVE-2022-29458</a><br><a href="https://ubuntu.com/security/notices/USN-5477-1">https://ubuntu.com/security/notices/USN-5477-1</a><br></details> |
| openssl | CVE-2022-2068 | MEDIUM | 1.1.1f-1ubuntu2.13 | 1.1.1f-1ubuntu2.15 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-2068">https://access.redhat.com/security/cve/CVE-2022-2068</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9</a><br><a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">https://nvd.nist.gov/vuln/detail/CVE-2022-2068</a><br><a href="https://ubuntu.com/security/notices/USN-5488-1">https://ubuntu.com/security/notices/USN-5488-1</a><br><a href="https://www.debian.org/security/2022/dsa-5169">https://www.debian.org/security/2022/dsa-5169</a><br><a href="https://www.openssl.org/news/secadv/20220621.txt">https://www.openssl.org/news/secadv/20220621.txt</a><br></details> |
| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
| perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| perl-modules-5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | <details><summary>Expand...</summary><a href="http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html">http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-16156">https://access.redhat.com/security/cve/CVE-2020-16156</a><br><a href="https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/">https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/</a><br><a href="https://metacpan.org/pod/distribution/CPAN/scripts/cpan">https://metacpan.org/pod/distribution/CPAN/scripts/cpan</a><br></details> |
| redis-server | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14147">https://access.redhat.com/security/cve/CVE-2020-14147</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147</a><br><a href="https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571">https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571</a><br><a href="https://github.com/antirez/redis/pull/6875">https://github.com/antirez/redis/pull/6875</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14147">https://nvd.nist.gov/vuln/detail/CVE-2020-14147</a><br><a href="https://security.gentoo.org/glsa/202008-17">https://security.gentoo.org/glsa/202008-17</a><br><a href="https://www.debian.org/security/2020/dsa-4731">https://www.debian.org/security/2020/dsa-4731</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details> |
| redis-server | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32626">https://access.redhat.com/security/cve/CVE-2021-32626</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591">https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c">https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32626.html">https://linux.oracle.com/cve/CVE-2021-32626.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E">https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">https://nvd.nist.gov/vuln/detail/CVE-2021-32626</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32627">https://access.redhat.com/security/cve/CVE-2021-32627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v">https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32627.html">https://linux.oracle.com/cve/CVE-2021-32627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">https://nvd.nist.gov/vuln/detail/CVE-2021-32627</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32628">https://access.redhat.com/security/cve/CVE-2021-32628</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr">https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32628.html">https://linux.oracle.com/cve/CVE-2021-32628.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">https://nvd.nist.gov/vuln/detail/CVE-2021-32628</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32672">https://access.redhat.com/security/cve/CVE-2021-32672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672</a><br><a href="https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd">https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm">https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">https://nvd.nist.gov/vuln/detail/CVE-2021-32672</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32675">https://access.redhat.com/security/cve/CVE-2021-32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8">https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32675.html">https://linux.oracle.com/cve/CVE-2021-32675.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E">https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">https://nvd.nist.gov/vuln/detail/CVE-2021-32675</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32687">https://access.redhat.com/security/cve/CVE-2021-32687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f">https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q">https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32687.html">https://linux.oracle.com/cve/CVE-2021-32687.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">https://nvd.nist.gov/vuln/detail/CVE-2021-32687</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-server | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41099">https://access.redhat.com/security/cve/CVE-2021-41099</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521">https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph">https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41099.html">https://linux.oracle.com/cve/CVE-2021-41099.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">https://nvd.nist.gov/vuln/detail/CVE-2021-41099</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2020-14147 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html</a><br><a href="https://access.redhat.com/security/cve/CVE-2020-14147">https://access.redhat.com/security/cve/CVE-2020-14147</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14147</a><br><a href="https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571">https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571</a><br><a href="https://github.com/antirez/redis/pull/6875">https://github.com/antirez/redis/pull/6875</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14147">https://nvd.nist.gov/vuln/detail/CVE-2020-14147</a><br><a href="https://security.gentoo.org/glsa/202008-17">https://security.gentoo.org/glsa/202008-17</a><br><a href="https://www.debian.org/security/2020/dsa-4731">https://www.debian.org/security/2020/dsa-4731</a><br><a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a><br></details> |
| redis-tools | CVE-2021-32626 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32626">https://access.redhat.com/security/cve/CVE-2021-32626</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591">https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c">https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32626.html">https://linux.oracle.com/cve/CVE-2021-32626.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E">https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">https://nvd.nist.gov/vuln/detail/CVE-2021-32626</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32627 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32627">https://access.redhat.com/security/cve/CVE-2021-32627</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v">https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32627.html">https://linux.oracle.com/cve/CVE-2021-32627.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">https://nvd.nist.gov/vuln/detail/CVE-2021-32627</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32628 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32628">https://access.redhat.com/security/cve/CVE-2021-32628</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3">https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr">https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32628.html">https://linux.oracle.com/cve/CVE-2021-32628.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">https://nvd.nist.gov/vuln/detail/CVE-2021-32628</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32672 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32672">https://access.redhat.com/security/cve/CVE-2021-32672</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672</a><br><a href="https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd">https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm">https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32672">https://nvd.nist.gov/vuln/detail/CVE-2021-32672</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32675 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32675">https://access.redhat.com/security/cve/CVE-2021-32675</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8">https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32675.html">https://linux.oracle.com/cve/CVE-2021-32675.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E">https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">https://nvd.nist.gov/vuln/detail/CVE-2021-32675</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-32687 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32687">https://access.redhat.com/security/cve/CVE-2021-32687</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f">https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q">https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32687.html">https://linux.oracle.com/cve/CVE-2021-32687.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">https://nvd.nist.gov/vuln/detail/CVE-2021-32687</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| redis-tools | CVE-2021-41099 | MEDIUM | 5:5.0.7-2ubuntu0.1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-41099">https://access.redhat.com/security/cve/CVE-2021-41099</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099</a><br><a href="https://errata.almalinux.org/8/ALSA-2021-3945.html">https://errata.almalinux.org/8/ALSA-2021-3945.html</a><br><a href="https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521">https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521</a><br><a href="https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph">https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph</a><br><a href="https://linux.oracle.com/cve/CVE-2021-41099.html">https://linux.oracle.com/cve/CVE-2021-41099.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3945.html">https://linux.oracle.com/errata/ELSA-2021-3945.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">https://nvd.nist.gov/vuln/detail/CVE-2021-41099</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0003/">https://security.netapp.com/advisory/ntap-20211104-0003/</a><br><a href="https://www.debian.org/security/2021/dsa-5001">https://www.debian.org/security/2021/dsa-5001</a><br><a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a><br></details> |
| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-common | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-common | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| vim-tiny | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| vim-tiny | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-31879">https://access.redhat.com/security/cve/CVE-2021-31879</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31879">https://nvd.nist.gov/vuln/detail/CVE-2021-31879</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4166">https://access.redhat.com/security/cve/CVE-2021-4166</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682</a><br><a href="https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)">https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)</a><br><a href="https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035">https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">https://nvd.nist.gov/vuln/detail/CVE-2021-4166</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br></details> |
| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4192">https://access.redhat.com/security/cve/CVE-2021-4192</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192</a><br><a href="https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952">https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22</a><br><a href="https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/">https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4192.html">https://linux.oracle.com/cve/CVE-2021-4192.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">https://nvd.nist.gov/vuln/detail/CVE-2021-4192</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2022-0213">https://access.redhat.com/security/cve/CVE-2022-0213</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213</a><br><a href="https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26">https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26</a><br><a href="https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed">https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0261">https://access.redhat.com/security/cve/CVE-2022-0261</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc</a><br><a href="https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)">https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)</a><br><a href="https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82">https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0261.html">https://linux.oracle.com/cve/CVE-2022-0261.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">https://nvd.nist.gov/vuln/detail/CVE-2022-0261</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0318">https://access.redhat.com/security/cve/CVE-2022-0318</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318</a><br><a href="https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc">https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc</a><br><a href="https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08">https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0318.html">https://linux.oracle.com/cve/CVE-2022-0318.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">https://nvd.nist.gov/vuln/detail/CVE-2022-0318</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0319">https://access.redhat.com/security/cve/CVE-2022-0319</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319</a><br><a href="https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9">https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9</a><br><a href="https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b">https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0351">https://access.redhat.com/security/cve/CVE-2022-0351</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d</a><br><a href="https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)">https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)</a><br><a href="https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161">https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0359">https://access.redhat.com/security/cve/CVE-2022-0359</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1</a><br><a href="https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)">https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)</a><br><a href="https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def">https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0359.html">https://linux.oracle.com/cve/CVE-2022-0359.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0361">https://access.redhat.com/security/cve/CVE-2022-0361</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366</a><br><a href="https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)">https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)</a><br><a href="https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b">https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0361.html">https://linux.oracle.com/cve/CVE-2022-0361.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0368">https://access.redhat.com/security/cve/CVE-2022-0368</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa</a><br><a href="https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)">https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9</a><br><a href="https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/">https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0392">https://access.redhat.com/security/cve/CVE-2022-0392</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a</a><br><a href="https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)">https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)</a><br><a href="https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126">https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0392.html">https://linux.oracle.com/cve/CVE-2022-0392.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</a><br></details> |
| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0408">https://access.redhat.com/security/cve/CVE-2022-0408</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31</a><br><a href="https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)">https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)</a><br><a href="https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d">https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0413 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0413">https://access.redhat.com/security/cve/CVE-2022-0413</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413</a><br><a href="https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a">https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a</a><br><a href="https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38">https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0413.html">https://linux.oracle.com/cve/CVE-2022-0413.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0894.html">https://linux.oracle.com/errata/ELSA-2022-0894.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0417">https://access.redhat.com/security/cve/CVE-2022-0417</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417</a><br><a href="https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a">https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a</a><br><a href="https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a">https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">https://nvd.nist.gov/vuln/detail/CVE-2022-0417</a><br></details> |
| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0554">https://access.redhat.com/security/cve/CVE-2022-0554</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554</a><br><a href="https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8">https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8</a><br><a href="https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71">https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0554.html">https://linux.oracle.com/cve/CVE-2022-0554.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">https://nvd.nist.gov/vuln/detail/CVE-2022-0554</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0572">https://access.redhat.com/security/cve/CVE-2022-0572</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f</a><br><a href="https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)">https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)</a><br><a href="https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf">https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">https://nvd.nist.gov/vuln/detail/CVE-2022-0572</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0629">https://access.redhat.com/security/cve/CVE-2022-0629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629</a><br><a href="https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc">https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc</a><br><a href="https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877">https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">https://nvd.nist.gov/vuln/detail/CVE-2022-0629</a><br></details> |
| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0685">https://access.redhat.com/security/cve/CVE-2022-0685</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87</a><br><a href="https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)">https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)</a><br><a href="https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782">https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">https://nvd.nist.gov/vuln/detail/CVE-2022-0685</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0714">https://access.redhat.com/security/cve/CVE-2022-0714</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa</a><br><a href="https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)">https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)</a><br><a href="https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3">https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">https://nvd.nist.gov/vuln/detail/CVE-2022-0714</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0943">https://access.redhat.com/security/cve/CVE-2022-0943</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3</a><br><a href="https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)">https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)</a><br><a href="https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1">https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1</a><br><a href="https://linux.oracle.com/cve/CVE-2022-0943.html">https://linux.oracle.com/cve/CVE-2022-0943.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">https://nvd.nist.gov/vuln/detail/CVE-2022-0943</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1154">https://access.redhat.com/security/cve/CVE-2022-1154</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154</a><br><a href="https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5">https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5</a><br><a href="https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425">https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1154.html">https://linux.oracle.com/cve/CVE-2022-1154.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">https://nvd.nist.gov/vuln/detail/CVE-2022-1154</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1420">https://access.redhat.com/security/cve/CVE-2022-1420</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca</a><br><a href="https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)">https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)</a><br><a href="https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326">https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1420.html">https://linux.oracle.com/cve/CVE-2022-1420.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5242.html">https://linux.oracle.com/errata/ELSA-2022-5242.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">https://nvd.nist.gov/vuln/detail/CVE-2022-1420</a><br></details> |
| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1616">https://access.redhat.com/security/cve/CVE-2022-1616</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c</a><br><a href="https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)">https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)</a><br><a href="https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2">https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">https://nvd.nist.gov/vuln/detail/CVE-2022-1616</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1619">https://access.redhat.com/security/cve/CVE-2022-1619</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619</a><br><a href="https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe">https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe</a><br><a href="https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450">https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">https://nvd.nist.gov/vuln/detail/CVE-2022-1619</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1620">https://access.redhat.com/security/cve/CVE-2022-1620</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620</a><br><a href="https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f">https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f</a><br><a href="https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51">https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">https://nvd.nist.gov/vuln/detail/CVE-2022-1620</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1621">https://access.redhat.com/security/cve/CVE-2022-1621</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b</a><br><a href="https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)">https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)</a><br><a href="https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb">https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1621.html">https://linux.oracle.com/cve/CVE-2022-1621.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">https://nvd.nist.gov/vuln/detail/CVE-2022-1621</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1629">https://access.redhat.com/security/cve/CVE-2022-1629</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629</a><br><a href="https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd">https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd</a><br><a href="https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee">https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1629.html">https://linux.oracle.com/cve/CVE-2022-1629.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5319.html">https://linux.oracle.com/errata/ELSA-2022-5319.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">https://nvd.nist.gov/vuln/detail/CVE-2022-1629</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1851 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1851">https://access.redhat.com/security/cve/CVE-2022-1851</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851</a><br><a href="https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad">https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad</a><br><a href="https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d">https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">https://nvd.nist.gov/vuln/detail/CVE-2022-1851</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1927">https://access.redhat.com/security/cve/CVE-2022-1927</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010</a><br><a href="https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)">https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)</a><br><a href="https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777">https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1942">https://access.redhat.com/security/cve/CVE-2022-1942</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d</a><br><a href="https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)">https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)</a><br><a href="https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071">https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br></details> |
| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1968">https://access.redhat.com/security/cve/CVE-2022-1968</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968</a><br><a href="https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895">https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b</a><br><a href="https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/">https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br></details> |
| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-3973">https://access.redhat.com/security/cve/CVE-2021-3973</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847</a><br><a href="https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)">https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)</a><br><a href="https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e">https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">https://nvd.nist.gov/vuln/detail/CVE-2021-3973</a><br><a href="https://ubuntu.com/security/notices/USN-5247-1">https://ubuntu.com/security/notices/USN-5247-1</a><br><a href="https://ubuntu.com/security/notices/USN-5433-1">https://ubuntu.com/security/notices/USN-5433-1</a><br></details> |
| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="http://seclists.org/fulldisclosure/2022/Mar/29">http://seclists.org/fulldisclosure/2022/Mar/29</a><br><a href="http://seclists.org/fulldisclosure/2022/May/35">http://seclists.org/fulldisclosure/2022/May/35</a><br><a href="http://www.openwall.com/lists/oss-security/2022/01/15/1">http://www.openwall.com/lists/oss-security/2022/01/15/1</a><br><a href="https://access.redhat.com/security/cve/CVE-2021-4193">https://access.redhat.com/security/cve/CVE-2021-4193</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193</a><br><a href="https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b">https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0</a><br><a href="https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/">https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/</a><br><a href="https://linux.oracle.com/cve/CVE-2021-4193.html">https://linux.oracle.com/cve/CVE-2021-4193.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0366.html">https://linux.oracle.com/errata/ELSA-2022-0366.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">https://nvd.nist.gov/vuln/detail/CVE-2021-4193</a><br><a href="https://support.apple.com/kb/HT213183">https://support.apple.com/kb/HT213183</a><br><a href="https://support.apple.com/kb/HT213256">https://support.apple.com/kb/HT213256</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0443">https://access.redhat.com/security/cve/CVE-2022-0443</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461</a><br><a href="https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)">https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)</a><br><a href="https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51">https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html">https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">https://nvd.nist.gov/vuln/detail/CVE-2022-0443</a><br><a href="https://ubuntu.com/security/notices/USN-5458-1">https://ubuntu.com/security/notices/USN-5458-1</a><br></details> |
| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-0729">https://access.redhat.com/security/cve/CVE-2022-0729</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30</a><br><a href="https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)">https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)</a><br><a href="https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea">https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html">https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">https://nvd.nist.gov/vuln/detail/CVE-2022-0729</a><br><a href="https://ubuntu.com/security/notices/USN-5460-1">https://ubuntu.com/security/notices/USN-5460-1</a><br></details> |
| xxd | CVE-2022-1733 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1733">https://access.redhat.com/security/cve/CVE-2022-1733</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733</a><br><a href="https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813">https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813</a><br><a href="https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a">https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">https://nvd.nist.gov/vuln/detail/CVE-2022-1733</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1735 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1735">https://access.redhat.com/security/cve/CVE-2022-1735</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1735</a><br><a href="https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97">https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97</a><br><a href="https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9">https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">https://nvd.nist.gov/vuln/detail/CVE-2022-1735</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1785 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1785">https://access.redhat.com/security/cve/CVE-2022-1785</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785</a><br><a href="https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839">https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839</a><br><a href="https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109">https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">https://nvd.nist.gov/vuln/detail/CVE-2022-1785</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1796 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1796">https://access.redhat.com/security/cve/CVE-2022-1796</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1796</a><br><a href="https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5">https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5</a><br><a href="https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e">https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">https://nvd.nist.gov/vuln/detail/CVE-2022-1796</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
| xxd | CVE-2022-1898 | LOW | 2:8.1.2269-1ubuntu5.7 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1898">https://access.redhat.com/security/cve/CVE-2022-1898</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898</a><br><a href="https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a">https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a</a><br><a href="https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea">https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea</a><br><a href="https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html">https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">https://nvd.nist.gov/vuln/detail/CVE-2022-1898</a><br><a href="https://ubuntu.com/security/notices/USN-5498-1">https://ubuntu.com/security/notices/USN-5498-1</a><br></details> |
#### Container: tomsquest/docker-radicale:3.1.7.0@sha256:c182c596c8bc869003845a594ea4242c506ae77d661e9e2511398389785cb9ec (alpine 3.14.6)
**alpine**
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| curl | CVE-2022-22576 | HIGH | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://hackerone.com/reports/1526328">https://hackerone.com/reports/1526328</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22576.html">https://linux.oracle.com/cve/CVE-2022-22576.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">https://nvd.nist.gov/vuln/detail/CVE-2022-22576</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27775 | HIGH | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://hackerone.com/reports/1546268">https://hackerone.com/reports/1546268</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">https://nvd.nist.gov/vuln/detail/CVE-2022-27775</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27781 | HIGH | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27781">https://access.redhat.com/security/cve/CVE-2022-27781</a><br><a href="https://curl.se/docs/CVE-2022-27781.html">https://curl.se/docs/CVE-2022-27781.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781</a><br><a href="https://github.com/curl/curl/commit/f6c335d63f">https://github.com/curl/curl/commit/f6c335d63f</a><br><a href="https://hackerone.com/reports/1555441">https://hackerone.com/reports/1555441</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">https://nvd.nist.gov/vuln/detail/CVE-2022-27781</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0009/">https://security.netapp.com/advisory/ntap-20220609-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| curl | CVE-2022-27782 | HIGH | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27782">https://access.redhat.com/security/cve/CVE-2022-27782</a><br><a href="https://curl.se/docs/CVE-2022-27782.html">https://curl.se/docs/CVE-2022-27782.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782</a><br><a href="https://hackerone.com/reports/1555796">https://hackerone.com/reports/1555796</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27782.html">https://linux.oracle.com/cve/CVE-2022-27782.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">https://nvd.nist.gov/vuln/detail/CVE-2022-27782</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0009/">https://security.netapp.com/advisory/ntap-20220609-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| curl | CVE-2022-27774 | MEDIUM | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://hackerone.com/reports/1543773">https://hackerone.com/reports/1543773</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27774.html">https://linux.oracle.com/cve/CVE-2022-27774.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">https://nvd.nist.gov/vuln/detail/CVE-2022-27774</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-27776 | MEDIUM | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://hackerone.com/reports/1547048">https://hackerone.com/reports/1547048</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27776.html">https://linux.oracle.com/cve/CVE-2022-27776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">https://nvd.nist.gov/vuln/detail/CVE-2022-27776</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| curl | CVE-2022-32205 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32205">https://access.redhat.com/security/cve/CVE-2022-32205</a><br><a href="https://curl.se/docs/CVE-2022-32205.html">https://curl.se/docs/CVE-2022-32205.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| curl | CVE-2022-32206 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| curl | CVE-2022-32207 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32207">https://access.redhat.com/security/cve/CVE-2022-32207</a><br><a href="https://curl.se/docs/CVE-2022-32207.html">https://curl.se/docs/CVE-2022-32207.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| curl | CVE-2022-32208 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| libcurl | CVE-2022-22576 | HIGH | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-22576">https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href="https://curl.se/docs/CVE-2022-22576.html">https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href="https://hackerone.com/reports/1526328">https://hackerone.com/reports/1526328</a><br><a href="https://linux.oracle.com/cve/CVE-2022-22576.html">https://linux.oracle.com/cve/CVE-2022-22576.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">https://nvd.nist.gov/vuln/detail/CVE-2022-22576</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27775 | HIGH | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27775">https://access.redhat.com/security/cve/CVE-2022-27775</a><br><a href="https://curl.se/docs/CVE-2022-27775.html">https://curl.se/docs/CVE-2022-27775.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775</a><br><a href="https://hackerone.com/reports/1546268">https://hackerone.com/reports/1546268</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">https://nvd.nist.gov/vuln/detail/CVE-2022-27775</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27781 | HIGH | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27781">https://access.redhat.com/security/cve/CVE-2022-27781</a><br><a href="https://curl.se/docs/CVE-2022-27781.html">https://curl.se/docs/CVE-2022-27781.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781</a><br><a href="https://github.com/curl/curl/commit/f6c335d63f">https://github.com/curl/curl/commit/f6c335d63f</a><br><a href="https://hackerone.com/reports/1555441">https://hackerone.com/reports/1555441</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">https://nvd.nist.gov/vuln/detail/CVE-2022-27781</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0009/">https://security.netapp.com/advisory/ntap-20220609-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| libcurl | CVE-2022-27782 | HIGH | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27782">https://access.redhat.com/security/cve/CVE-2022-27782</a><br><a href="https://curl.se/docs/CVE-2022-27782.html">https://curl.se/docs/CVE-2022-27782.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782</a><br><a href="https://hackerone.com/reports/1555796">https://hackerone.com/reports/1555796</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27782.html">https://linux.oracle.com/cve/CVE-2022-27782.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">https://nvd.nist.gov/vuln/detail/CVE-2022-27782</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0009/">https://security.netapp.com/advisory/ntap-20220609-0009/</a><br><a href="https://ubuntu.com/security/notices/USN-5412-1">https://ubuntu.com/security/notices/USN-5412-1</a><br></details> |
| libcurl | CVE-2022-27774 | MEDIUM | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27774">https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href="https://curl.se/docs/CVE-2022-27774.html">https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href="https://hackerone.com/reports/1543773">https://hackerone.com/reports/1543773</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27774.html">https://linux.oracle.com/cve/CVE-2022-27774.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">https://nvd.nist.gov/vuln/detail/CVE-2022-27774</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-27776 | MEDIUM | 7.79.1-r0 | 7.79.1-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-27776">https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href="https://curl.se/docs/CVE-2022-27776.html">https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href="https://hackerone.com/reports/1547048">https://hackerone.com/reports/1547048</a><br><a href="https://linux.oracle.com/cve/CVE-2022-27776.html">https://linux.oracle.com/cve/CVE-2022-27776.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5313.html">https://linux.oracle.com/errata/ELSA-2022-5313.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">https://nvd.nist.gov/vuln/detail/CVE-2022-27776</a><br><a href="https://security.netapp.com/advisory/ntap-20220609-0008/">https://security.netapp.com/advisory/ntap-20220609-0008/</a><br><a href="https://ubuntu.com/security/notices/USN-5397-1">https://ubuntu.com/security/notices/USN-5397-1</a><br></details> |
| libcurl | CVE-2022-32205 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32205">https://access.redhat.com/security/cve/CVE-2022-32205</a><br><a href="https://curl.se/docs/CVE-2022-32205.html">https://curl.se/docs/CVE-2022-32205.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| libcurl | CVE-2022-32206 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32206">https://access.redhat.com/security/cve/CVE-2022-32206</a><br><a href="https://curl.se/docs/CVE-2022-32206.html">https://curl.se/docs/CVE-2022-32206.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| libcurl | CVE-2022-32207 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32207">https://access.redhat.com/security/cve/CVE-2022-32207</a><br><a href="https://curl.se/docs/CVE-2022-32207.html">https://curl.se/docs/CVE-2022-32207.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br></details> |
| libcurl | CVE-2022-32208 | MEDIUM | 7.79.1-r0 | 7.79.1-r2 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-32208">https://access.redhat.com/security/cve/CVE-2022-32208</a><br><a href="https://curl.se/docs/CVE-2022-32208.html">https://curl.se/docs/CVE-2022-32208.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208</a><br><a href="https://ubuntu.com/security/notices/USN-5495-1">https://ubuntu.com/security/notices/USN-5495-1</a><br><a href="https://ubuntu.com/security/notices/USN-5499-1">https://ubuntu.com/security/notices/USN-5499-1</a><br></details> |
| pcre2 | CVE-2022-1586 | CRITICAL | 10.36-r0 | 10.36-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1586">https://access.redhat.com/security/cve/CVE-2022-1586</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077976,">https://bugzilla.redhat.com/show_bug.cgi?id=2077976,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,">https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c">https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1586.html">https://linux.oracle.com/cve/CVE-2022-1586.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">https://nvd.nist.gov/vuln/detail/CVE-2022-1586</a><br></details> |
| pcre2 | CVE-2022-1587 | CRITICAL | 10.36-r0 | 10.36-r1 | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-1587">https://access.redhat.com/security/cve/CVE-2022-1587</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2077983,">https://bugzilla.redhat.com/show_bug.cgi?id=2077983,</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587</a><br><a href="https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0">https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0</a><br><a href="https://linux.oracle.com/cve/CVE-2022-1587.html">https://linux.oracle.com/cve/CVE-2022-1587.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-5251.html">https://linux.oracle.com/errata/ELSA-2022-5251.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">https://nvd.nist.gov/vuln/detail/CVE-2022-1587</a><br></details> |
**python-pkg**
| No Vulnerabilities found |
|:---------------------------------|

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="radicale-0.0.5"></a>
### [radicale-0.0.5](https://github.com/truecharts/apps/compare/radicale-0.0.4...radicale-0.0.5) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="radicale-0.0.4"></a>
### [radicale-0.0.4](https://github.com/truecharts/apps/compare/radicale-0.0.3...radicale-0.0.4) (2022-07-04)

View File

@ -3,4 +3,4 @@ dependencies:
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-04T19:56:39.475589241Z"
generated: "2022-07-09T19:30:53.263397224Z"

View File

@ -28,7 +28,7 @@ sources:
- https://github.com/tomsquest/docker-radicale
- https://hub.docker.com/r/tomsquest/docker-radicale
type: application
version: 0.0.4
version: 0.0.5
annotations:
truecharts.org/catagories: |
- radicale

View File

@ -56,9 +56,9 @@ env:
service:
main:
protocol: HTTP
ports:
main:
protocol: HTTP
targetPort: 5232
port: 10255

View File

@ -1,7 +0,0 @@
# Configuration Options
##### Connecting to other apps
If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide.
##### Available config options
In the future this page is going to contain an automated list of options available in the installation/edit UI.

View File

@ -1,6 +0,0 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-04T20:02:07.517969686Z"

View File

@ -1,67 +0,0 @@
# Default Helm-Values
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
Most of our Apps also consume our "common" Helm Chart.
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| env.DNS_SERVER_ALLOW_TXT_BLOCKING_REPORT | bool | `false` | |
| env.DNS_SERVER_DOMAIN | string | `"dns-server"` | |
| env.DNS_SERVER_ENABLE_BLOCKING | bool | `false` | |
| env.DNS_SERVER_FORWARDERS | string | `"1.1.1.1, 8.8.8.8"` | |
| env.DNS_SERVER_FORWARDER_PROTOCOL | string | `"Tcp"` | |
| env.DNS_SERVER_OPTIONAL_PROTOCOL_DNS_OVER_HTTP | bool | `false` | |
| env.DNS_SERVER_PREFER_IPV6 | bool | `false` | |
| env.DNS_SERVER_RECURSION | string | `"AllowOnlyForPrivateNetworks"` | |
| env.DNS_SERVER_RECURSION_ALLOWED_NETWORKS | string | `"127.0.0.1, 192.168.1.0/24"` | |
| env.DNS_SERVER_RECURSION_DENIED_NETWORKS | string | `"1.1.1.0/24"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/technitium"` | |
| image.tag | string | `"v8.0@sha256:b59d697bde5613f3c183666e373f80dcf2578d310cd84920dcb1ce97748bf394"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/etc/dns/config"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
| secret.DNS_SERVER_ADMIN_PASSWORD | string | `"password"` | |
| securityContext.allowPrivilegeEscalation | bool | `true` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `false` | |
| service.dns-cert.enabled | bool | `true` | |
| service.dns-cert.ports.dns-cert.enabled | bool | `true` | |
| service.dns-cert.ports.dns-cert.port | int | `10202` | |
| service.dns-cert.ports.dns-cert.protocol | string | `"TCP"` | |
| service.dns-cert.ports.dns-cert.targetPort | int | `80` | |
| service.dns-https-proxy.enabled | bool | `true` | |
| service.dns-https-proxy.ports.dns-https-proxy.enabled | bool | `true` | |
| service.dns-https-proxy.ports.dns-https-proxy.port | int | `10204` | |
| service.dns-https-proxy.ports.dns-https-proxy.protocol | string | `"TCP"` | |
| service.dns-https-proxy.ports.dns-https-proxy.targetPort | int | `8053` | |
| service.dns-https.enabled | bool | `true` | |
| service.dns-https.ports.dns-https.enabled | bool | `true` | |
| service.dns-https.ports.dns-https.port | int | `10203` | |
| service.dns-https.ports.dns-https.protocol | string | `"TCP"` | |
| service.dns-https.ports.dns-https.targetPort | int | `443` | |
| service.dns-tcp.enabled | bool | `true` | |
| service.dns-tcp.ports.dns-tcp.enabled | bool | `true` | |
| service.dns-tcp.ports.dns-tcp.port | int | `53` | |
| service.dns-tcp.ports.dns-tcp.targetPort | int | `53` | |
| service.dns-tls.enabled | bool | `true` | |
| service.dns-tls.ports.dns-tls.enabled | bool | `true` | |
| service.dns-tls.ports.dns-tls.port | int | `853` | |
| service.dns-tls.ports.dns-tls.protocol | string | `"TCP"` | |
| service.dns-tls.ports.dns-tls.targetPort | int | `853` | |
| service.dns-udp.enabled | bool | `true` | |
| service.dns-udp.ports.dns-udp.enabled | bool | `true` | |
| service.dns-udp.ports.dns-udp.port | int | `53` | |
| service.dns-udp.ports.dns-udp.protocol | string | `"UDP"` | |
| service.dns-udp.ports.dns-udp.targetPort | int | `53` | |
| service.main.ports.main.port | int | `5380` | |
| service.main.ports.main.targetPort | int | `5380` | |
All Rights Reserved - The TrueCharts Project

File diff suppressed because one or more lines are too long

View File

@ -1,6 +1,15 @@
# Changelog<br>
<a name="technitium-1.0.9"></a>
### [technitium-1.0.9](https://github.com/truecharts/apps/compare/technitium-1.0.8...technitium-1.0.9) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="technitium-1.0.8"></a>
### [technitium-1.0.8](https://github.com/truecharts/apps/compare/technitium-1.0.7...technitium-1.0.8) (2022-07-04)
@ -88,12 +97,3 @@
#### Chore
* sync all apps persistence configuration and always default to PVC
#### Refactor
* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836))
<a name="technitium-0.0.16"></a>
### [technitium-0.0.16](https://github.com/truecharts/apps/compare/technitium-0.0.15...technitium-0.0.16) (2022-05-31)

View File

@ -0,0 +1,6 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-09T19:30:53.652720703Z"

View File

@ -21,7 +21,7 @@ sources:
- https://technitium.com/
- https://hub.docker.com/r/technitium/dns-server
type: application
version: 1.0.8
version: 1.0.9
annotations:
truecharts.org/catagories: |
- networking

View File

@ -33,16 +33,13 @@ service:
main:
port: 5380
targetPort: 5380
dns-tcp:
dns:
enabled: true
ports:
dns-tcp:
enabled: true
port: 53
targetPort: 53
dns-udp:
enabled: true
ports:
dns-udp:
enabled: true
protocol: UDP

View File

@ -526,9 +526,9 @@ questions:
type: int
default: 5380
- variable: dns-udp
label: "DNS-UDP Service"
description: "DNS-UDP Service"
- variable: dns
label: "DNS Service"
description: "DNS Service"
schema:
additional_attrs: true
type: dict
@ -652,86 +652,6 @@ questions:
schema:
type: int
default: 53
- variable: dns-tcp
label: "DNS-TCP Service"
description: "DNS-TCP Service"
schema:
additional_attrs: true
type: dict
attrs:
- variable: enabled
label: "Enable the service"
schema:
type: boolean
default: true
hidden: true
- variable: type
label: "Service Type"
description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer"
schema:
type: string
default: "Simple"
enum:
- value: "Simple"
description: "Simple"
- value: "ClusterIP"
description: "ClusterIP"
- value: "NodePort"
description: "NodePort (Advanced)"
- value: "LoadBalancer"
description: "LoadBalancer (Advanced)"
- variable: loadBalancerIP
label: "LoadBalancer IP"
description: "LoadBalancerIP"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: string
default: ""
- variable: externalIPs
label: "External IP's"
description: "External IP's"
schema:
show_if: [["type", "=", "LoadBalancer"]]
type: list
default: []
items:
- variable: externalIP
label: "External IP"
schema:
type: string
- variable: ipFamilyPolicy
label: "IP Family Policy"
description: "(Advanced) Specify the ip policy"
schema:
show_if: [["type", "!=", "Simple"]]
type: string
default: "SingleStack"
enum:
- value: "SingleStack"
description: "SingleStack"
- value: "PreferDualStack"
description: "PreferDualStack"
- value: "RequireDualStack"
description: "RequireDualStack"
- variable: ipFamilies
label: "(advanced) IP families"
description: "(advanced) The ip families that should be used"
schema:
show_if: [["type", "!=", "Simple"]]
type: list
default: []
items:
- variable: ipFamily
label: "IP family"
schema:
type: string
- variable: ports
label: "Service's Port(s) Configuration"
schema:
additional_attrs: true
type: dict
attrs:
- variable: dns-tcp
label: "DNS-TCP Service Port Configuration"
schema:

View File

@ -0,0 +1,99 @@
# Changelog<br>
<a name="deluge-11.0.9"></a>
### [deluge-11.0.9](https://github.com/truecharts/apps/compare/deluge-11.0.8...deluge-11.0.9) (2022-07-09)
#### Chore
* combine some ports ([#3096](https://github.com/truecharts/apps/issues/3096))
<a name="deluge-11.0.8"></a>
### [deluge-11.0.8](https://github.com/truecharts/apps/compare/deluge-11.0.7...deluge-11.0.8) (2022-07-04)
#### Chore
* update helm general non-major helm releases ([#3066](https://github.com/truecharts/apps/issues/3066))
<a name="deluge-11.0.7"></a>
### [deluge-11.0.7](https://github.com/truecharts/apps/compare/deluge-11.0.6...deluge-11.0.7) (2022-06-25)
#### Chore
* update helm general non-major helm releases ([#2977](https://github.com/truecharts/apps/issues/2977))
<a name="deluge-11.0.6"></a>
### [deluge-11.0.6](https://github.com/truecharts/apps/compare/deluge-11.0.5...deluge-11.0.6) (2022-06-22)
#### Chore
* update helm general non-major helm releases ([#2948](https://github.com/truecharts/apps/issues/2948))
<a name="deluge-11.0.5"></a>
### [deluge-11.0.5](https://github.com/truecharts/apps/compare/deluge-11.0.4...deluge-11.0.5) (2022-06-21)
#### Chore
* update helm general non-major helm releases ([#2943](https://github.com/truecharts/apps/issues/2943))
<a name="deluge-11.0.4"></a>
### [deluge-11.0.4](https://github.com/truecharts/apps/compare/deluge-11.0.3...deluge-11.0.4) (2022-06-14)
#### Chore
* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886))
<a name="deluge-11.0.3"></a>
### [deluge-11.0.3](https://github.com/truecharts/apps/compare/deluge-11.0.2...deluge-11.0.3) (2022-06-11)
#### Chore
* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854))
<a name="deluge-11.0.2"></a>
### [deluge-11.0.2](https://github.com/truecharts/apps/compare/deluge-11.0.1...deluge-11.0.2) (2022-06-07)
#### Fix
* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format.
<a name="deluge-11.0.1"></a>
### [deluge-11.0.1](https://github.com/truecharts/apps/compare/deluge-10.0.23...deluge-11.0.1) (2022-06-07)
#### Chore
* Auto-update chart README [skip ci]
* sync all apps persistence configuration and always default to PVC
#### Fix
* remove malfunctioning SCALE migration script
#### Refactor
* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836))
<a name="deluge-11.0.0"></a>
### [deluge-11.0.0](https://github.com/truecharts/apps/compare/deluge-10.0.23...deluge-11.0.0) (2022-06-07)
#### Chore
* sync all apps persistence configuration and always default to PVC

View File

@ -0,0 +1,6 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-09T19:31:06.004492763Z"

View File

@ -0,0 +1,29 @@
apiVersion: v2
appVersion: "2.0.5"
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.2.0
deprecated: false
description: Deluge App for TrueNAS SCALE
home: https://github.com/truecharts/apps/tree/master/charts/stable/deluge
icon: https://truecharts.org/_static/img/appicons/deluge.png
keywords:
- transmission
- torrent
- usenet
kubeVersion: '>=1.16.0-0'
maintainers:
- email: info@truecharts.org
name: TrueCharts
url: https://truecharts.org
name: deluge
sources:
- https://github.com/deluge-torrent/deluge
type: application
version: 11.0.9
annotations:
truecharts.org/catagories: |
- media
truecharts.org/SCALE-support: "true"
truecharts.org/grade: U

View File

@ -0,0 +1,37 @@
# Introduction
Deluge App for TrueNAS SCALE
TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation.
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)**
## Source Code
* <https://github.com/deluge-torrent/deluge>
## Requirements
Kubernetes: `>=1.16.0-0`
## Dependencies
| Repository | Name | Version |
|------------|------|---------|
| https://library-charts.truecharts.org | common | 10.2.0 |
## Installing the Chart
To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/).
## Upgrading, Rolling Back and Uninstalling the Chart
To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/).
## Support
- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first.
- See the [Wiki](https://truecharts.org)
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
- Open a [issue](https://github.com/truecharts/apps/issues/new/choose)
---
All Rights Reserved - The TrueCharts Project

View File

@ -0,0 +1,3 @@
Deluge App for TrueNAS SCALE
This App is supplied by TrueCharts, for more information please visit https://truecharts.org

View File

@ -0,0 +1,38 @@
image:
repository: tccr.io/truecharts/deluge
pullPolicy: IfNotPresent
tag: v2.0.5@sha256:18dc16d8e448ece00534e17f9e226a781320b9939f4194e12481e6d1156ed23b
securityContext:
runAsNonRoot: false
readOnlyRootFilesystem: false
podSecurityContext:
runAsUser: 0
runAsGroup: 0
service:
main:
ports:
main:
port: 8112
targetPort: 8112
torrent:
enabled: true
ports:
tcp:
enabled: true
port: 51413
targetPort: 51413
udp:
enabled: true
port: 51413
targetPort: 51413
protocol: UDP
persistence:
config:
enabled: true
mountPath: "/config"
varrun:
enabled: true

File diff suppressed because it is too large Load Diff

View File

@ -1,6 +0,0 @@
dependencies:
- name: common
repository: https://library-charts.truecharts.org
version: 10.2.0
digest: sha256:89affb18a1c45ba54589f4cea91bf10d24adb577afda10a1d217aef76b20236e
generated: "2022-07-07T18:03:27.440548765Z"

Some files were not shown because too many files have changed in this diff Show More