-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update all non-major dependencies #134
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bash |
CVE-2022-3715 | MEDIUM | 5.1-6ubuntu1 | 5.1-6ubuntu1.1 |
binutils |
CVE-2022-35205 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
binutils |
CVE-2022-44840 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils |
CVE-2022-45703 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils |
CVE-2022-47007 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils |
CVE-2022-47008 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils |
CVE-2022-47010 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils |
CVE-2022-47011 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils |
CVE-2022-47695 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils |
CVE-2022-48063 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils |
CVE-2022-48065 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils |
CVE-2022-4285 | LOW | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
binutils-common |
CVE-2022-35205 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
binutils-common |
CVE-2022-44840 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-common |
CVE-2022-45703 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-common |
CVE-2022-47007 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-common |
CVE-2022-47008 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-common |
CVE-2022-47010 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-common |
CVE-2022-47011 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-common |
CVE-2022-47695 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils-common |
CVE-2022-48063 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils-common |
CVE-2022-48065 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils-common |
CVE-2022-4285 | LOW | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
binutils-x86-64-linux-gnu |
CVE-2022-35205 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
binutils-x86-64-linux-gnu |
CVE-2022-44840 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-x86-64-linux-gnu |
CVE-2022-45703 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-x86-64-linux-gnu |
CVE-2022-47007 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-x86-64-linux-gnu |
CVE-2022-47008 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-x86-64-linux-gnu |
CVE-2022-47010 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-x86-64-linux-gnu |
CVE-2022-47011 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
binutils-x86-64-linux-gnu |
CVE-2022-47695 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils-x86-64-linux-gnu |
CVE-2022-48063 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils-x86-64-linux-gnu |
CVE-2022-48065 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
binutils-x86-64-linux-gnu |
CVE-2022-4285 | LOW | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
bsdutils |
CVE-2024-28085 | MEDIUM | 1:2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
curl |
CVE-2023-46218 | MEDIUM | 7.81.0-1ubuntu1.14 | 7.81.0-1ubuntu1.15 |
curl |
CVE-2024-2398 | MEDIUM | 7.81.0-1ubuntu1.14 | 7.81.0-1ubuntu1.16 |
libbinutils |
CVE-2022-35205 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
libbinutils |
CVE-2022-44840 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libbinutils |
CVE-2022-45703 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libbinutils |
CVE-2022-47007 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libbinutils |
CVE-2022-47008 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libbinutils |
CVE-2022-47010 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libbinutils |
CVE-2022-47011 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libbinutils |
CVE-2022-47695 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libbinutils |
CVE-2022-48063 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libbinutils |
CVE-2022-48065 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libbinutils |
CVE-2022-4285 | LOW | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
libblkid1 |
CVE-2024-28085 | MEDIUM | 2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
libc-bin |
CVE-2023-5156 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
libc-bin |
CVE-2024-2961 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.7 |
libc-bin |
CVE-2024-33599 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc-bin |
CVE-2024-33600 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc-bin |
CVE-2024-33601 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc-bin |
CVE-2024-33602 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc-bin |
CVE-2023-4806 | LOW | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
libc-bin |
CVE-2023-4813 | LOW | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
libc6 |
CVE-2023-5156 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
libc6 |
CVE-2024-2961 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.7 |
libc6 |
CVE-2024-33599 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc6 |
CVE-2024-33600 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc6 |
CVE-2024-33601 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc6 |
CVE-2024-33602 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
libc6 |
CVE-2023-4806 | LOW | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
libc6 |
CVE-2023-4813 | LOW | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
libctf-nobfd0 |
CVE-2022-35205 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
libctf-nobfd0 |
CVE-2022-44840 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf-nobfd0 |
CVE-2022-45703 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf-nobfd0 |
CVE-2022-47007 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf-nobfd0 |
CVE-2022-47008 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf-nobfd0 |
CVE-2022-47010 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf-nobfd0 |
CVE-2022-47011 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf-nobfd0 |
CVE-2022-47695 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libctf-nobfd0 |
CVE-2022-48063 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libctf-nobfd0 |
CVE-2022-48065 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libctf-nobfd0 |
CVE-2022-4285 | LOW | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
libctf0 |
CVE-2022-35205 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
libctf0 |
CVE-2022-44840 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf0 |
CVE-2022-45703 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf0 |
CVE-2022-47007 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf0 |
CVE-2022-47008 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf0 |
CVE-2022-47010 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf0 |
CVE-2022-47011 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.5 |
libctf0 |
CVE-2022-47695 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libctf0 |
CVE-2022-48063 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libctf0 |
CVE-2022-48065 | MEDIUM | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.6 |
libctf0 |
CVE-2022-4285 | LOW | 2.38-4ubuntu2.3 | 2.38-4ubuntu2.4 |
libcurl4 |
CVE-2023-46218 | MEDIUM | 7.81.0-1ubuntu1.14 | 7.81.0-1ubuntu1.15 |
libcurl4 |
CVE-2024-2398 | MEDIUM | 7.81.0-1ubuntu1.14 | 7.81.0-1ubuntu1.16 |
libexpat1 |
CVE-2023-52425 | MEDIUM | 2.4.7-1ubuntu0.2 | 2.4.7-1ubuntu0.3 |
libexpat1 |
CVE-2024-28757 | MEDIUM | 2.4.7-1ubuntu0.2 | 2.4.7-1ubuntu0.3 |
libgnutls30 |
CVE-2023-5981 | MEDIUM | 3.7.3-4ubuntu1.2 | 3.7.3-4ubuntu1.3 |
libgnutls30 |
CVE-2024-0553 | MEDIUM | 3.7.3-4ubuntu1.2 | 3.7.3-4ubuntu1.4 |
libgnutls30 |
CVE-2024-0567 | MEDIUM | 3.7.3-4ubuntu1.2 | 3.7.3-4ubuntu1.4 |
libgnutls30 |
CVE-2024-28834 | MEDIUM | 3.7.3-4ubuntu1.2 | 3.7.3-4ubuntu1.5 |
libgnutls30 |
CVE-2024-28835 | MEDIUM | 3.7.3-4ubuntu1.2 | 3.7.3-4ubuntu1.5 |
libgssapi-krb5-2 |
CVE-2023-36054 | MEDIUM | 1.19.2-2ubuntu0.2 | 1.19.2-2ubuntu0.3 |
libk5crypto3 |
CVE-2023-36054 | MEDIUM | 1.19.2-2ubuntu0.2 | 1.19.2-2ubuntu0.3 |
libkrb5-3 |
CVE-2023-36054 | MEDIUM | 1.19.2-2ubuntu0.2 | 1.19.2-2ubuntu0.3 |
libkrb5support0 |
CVE-2023-36054 | MEDIUM | 1.19.2-2ubuntu0.2 | 1.19.2-2ubuntu0.3 |
libldap-2.5-0 |
CVE-2023-2953 | LOW | 2.5.16+dfsg-0ubuntu0.22.04.1 | 2.5.16+dfsg-0ubuntu0.22.04.2 |
libmount1 |
CVE-2024-28085 | MEDIUM | 2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
libnghttp2-14 |
CVE-2023-44487 | MEDIUM | 1.43.0-1build3 | 1.43.0-1ubuntu0.1 |
libnghttp2-14 |
CVE-2024-28182 | MEDIUM | 1.43.0-1build3 | 1.43.0-1ubuntu0.2 |
libpam-modules |
CVE-2024-22365 | MEDIUM | 1.4.0-11ubuntu2.3 | 1.4.0-11ubuntu2.4 |
libpam-modules-bin |
CVE-2024-22365 | MEDIUM | 1.4.0-11ubuntu2.3 | 1.4.0-11ubuntu2.4 |
libpam-runtime |
CVE-2024-22365 | MEDIUM | 1.4.0-11ubuntu2.3 | 1.4.0-11ubuntu2.4 |
libpam0g |
CVE-2024-22365 | MEDIUM | 1.4.0-11ubuntu2.3 | 1.4.0-11ubuntu2.4 |
libprocps8 |
CVE-2023-4016 | LOW | 2:3.3.17-6ubuntu2 | 2:3.3.17-6ubuntu2.1 |
libsmartcols1 |
CVE-2024-28085 | MEDIUM | 2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
libssh-4 |
CVE-2023-48795 | MEDIUM | 0.9.6-2ubuntu0.22.04.1 | 0.9.6-2ubuntu0.22.04.2 |
libssh-4 |
CVE-2023-6004 | MEDIUM | 0.9.6-2ubuntu0.22.04.1 | 0.9.6-2ubuntu0.22.04.3 |
libssh-4 |
CVE-2023-6918 | MEDIUM | 0.9.6-2ubuntu0.22.04.1 | 0.9.6-2ubuntu0.22.04.3 |
libssl3 |
CVE-2022-40735 | MEDIUM | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.16 |
libssl3 |
CVE-2023-5363 | MEDIUM | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
libssl3 |
CVE-2023-2975 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
libssl3 |
CVE-2023-3446 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
libssl3 |
CVE-2023-3817 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
libssl3 |
CVE-2023-5678 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
libssl3 |
CVE-2023-6129 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
libssl3 |
CVE-2023-6237 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
libssl3 |
CVE-2024-0727 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
libuuid1 |
CVE-2024-28085 | MEDIUM | 2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
locales |
CVE-2023-5156 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
locales |
CVE-2024-2961 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.7 |
locales |
CVE-2024-33599 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
locales |
CVE-2024-33600 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
locales |
CVE-2024-33601 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
locales |
CVE-2024-33602 | MEDIUM | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.8 |
locales |
CVE-2023-4806 | LOW | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
locales |
CVE-2023-4813 | LOW | 2.35-0ubuntu3.4 | 2.35-0ubuntu3.5 |
login |
CVE-2023-4641 | LOW | 1:4.8.1-2ubuntu2.1 | 1:4.8.1-2ubuntu2.2 |
mount |
CVE-2024-28085 | MEDIUM | 2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
openssl |
CVE-2022-40735 | MEDIUM | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.16 |
openssl |
CVE-2023-5363 | MEDIUM | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
openssl |
CVE-2023-2975 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
openssl |
CVE-2023-3446 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
openssl |
CVE-2023-3817 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.12 |
openssl |
CVE-2023-5678 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
openssl |
CVE-2023-6129 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
openssl |
CVE-2023-6237 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
openssl |
CVE-2024-0727 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.14 |
openssl |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.10 | 3.0.2-0ubuntu1.17 |
passwd |
CVE-2023-4641 | LOW | 1:4.8.1-2ubuntu2.1 | 1:4.8.1-2ubuntu2.2 |
perl-base |
CVE-2023-47038 | MEDIUM | 5.34.0-3ubuntu1.2 | 5.34.0-3ubuntu1.3 |
perl-base |
CVE-2022-48522 | LOW | 5.34.0-3ubuntu1.2 | 5.34.0-3ubuntu1.3 |
procps |
CVE-2023-4016 | LOW | 2:3.3.17-6ubuntu2 | 2:3.3.17-6ubuntu2.1 |
tar |
CVE-2023-39804 | MEDIUM | 1.34+dfsg-1ubuntu0.1.22.04.1 | 1.34+dfsg-1ubuntu0.1.22.04.2 |
util-linux |
CVE-2024-28085 | MEDIUM | 2.37.2-4ubuntu3 | 2.37.2-4ubuntu3.3 |
wget |
CVE-2024-38428 | MEDIUM | 1.21.2-2ubuntu1 | 1.21.2-2ubuntu1.1 |
No Misconfigurations found
Java
5 known vulnerabilities found (CRITICAL: 1 HIGH: 2 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.jayway.jsonpath:json-path |
CVE-2023-51074 | MEDIUM | 2.6.0 | 2.9.0 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 2.4.7 | 2.4.9 |
org.bitbucket.b_c:jose4j |
CVE-2023-51775 | MEDIUM | 0.9.3 | 0.9.4 |
org.postgresql:postgresql |
CVE-2024-1597 | CRITICAL | 42.4.3 | 42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
org.xerial:sqlite-jdbc |
CVE-2023-32697 | HIGH | 3.25.2 | 3.41.2.2 |
No Misconfigurations found
🦙 MegaLinter status: ❌ ERROR
See detailed report in MegaLinter reports You could have same capabilities but better runtime performances if you request a new MegaLinter flavor. |
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
libssl3 |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
No Misconfigurations found
Java
12 known vulnerabilities found (CRITICAL: 5 HIGH: 4 MEDIUM: 2 LOW: 1)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
ca.uhn.hapi.fhir:org.hl7.fhir.convertors |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.convertors |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
ca.uhn.hapi.fhir:org.hl7.fhir.r5 |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.r5 |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
ca.uhn.hapi.fhir:org.hl7.fhir.validation |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.validation |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 29.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 29.0-jre | 32.0.0-android |
org.apache.commons:commons-text |
CVE-2022-42889 | CRITICAL | 1.7 | 1.10.0 |
org.apache.httpcomponents:httpclient |
CVE-2020-13956 | MEDIUM | 4.5.12 | 4.5.13, 5.0.3 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
cups-libs |
CVE-2024-35235 | MEDIUM | 1:2.3.3op2-24.el9 | 1:2.3.3op2-27.el9_4 |
java-17-openjdk-headless |
CVE-2024-21147 | HIGH | 1:17.0.11.0.9-2.el9 | 1:17.0.12.0.7-2.el9 |
java-17-openjdk-headless |
CVE-2024-21131 | MEDIUM | 1:17.0.11.0.9-2.el9 | 1:17.0.12.0.7-2.el9 |
java-17-openjdk-headless |
CVE-2024-21138 | MEDIUM | 1:17.0.11.0.9-2.el9 | 1:17.0.12.0.7-2.el9 |
java-17-openjdk-headless |
CVE-2024-21140 | MEDIUM | 1:17.0.11.0.9-2.el9 | 1:17.0.12.0.7-2.el9 |
java-17-openjdk-headless |
CVE-2024-21145 | MEDIUM | 1:17.0.11.0.9-2.el9 | 1:17.0.12.0.7-2.el9 |
python3 |
CVE-2024-4032 | LOW | 3.9.18-3.el9_4.1 | 3.9.18-3.el9_4.3 |
python3-libs |
CVE-2024-4032 | LOW | 3.9.18-3.el9_4.1 | 3.9.18-3.el9_4.3 |
No Misconfigurations found
Java
15 known vulnerabilities found (CRITICAL: 0 HIGH: 5 MEDIUM: 10 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.12.2 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 | HIGH | 2.12.2 | 2.12.6, 2.13.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.2 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.2 | 2.12.7.1, 2.13.4 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.24 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.100.Final | 4.1.108.Final |
io.vertx:vertx-core |
CVE-2024-1023 | MEDIUM | 4.5.0 | 4.5.2, 4.4.7 |
io.vertx:vertx-core |
CVE-2024-1300 | MEDIUM | 4.5.0 | 4.4.8, 4.5.3 |
org.apache.kafka:kafka-metadata |
CVE-2024-27309 | MEDIUM | 3.5.1 | 3.6.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.7.2 | 3.8.4, 3.9.2 |
org.bitbucket.b_c:jose4j |
CVE-2023-51775 | MEDIUM | 0.9.3 | 0.9.4 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 | MEDIUM | 1.4.10 | 1.4.21 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 | MEDIUM | 1.4.10 | 1.6.0 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.1 | 1.1.10.4 |
No Misconfigurations found
opt/kafka-exporter/kafka_exporter
24 known vulnerabilities found (HIGH: 5 MEDIUM: 18 LOW: 0 CRITICAL: 1)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
golang.org/x/crypto |
CVE-2023-48795 | MEDIUM | v0.0.0-20220722155217-630584e8d5aa | 0.17.0 |
golang.org/x/net |
CVE-2023-39325 | HIGH | v0.10.0 | 0.17.0 |
golang.org/x/net |
CVE-2023-3978 | MEDIUM | v0.10.0 | 0.13.0 |
golang.org/x/net |
CVE-2023-44487 | MEDIUM | v0.10.0 | 0.17.0 |
golang.org/x/net |
CVE-2023-45288 | MEDIUM | v0.10.0 | 0.23.0 |
google.golang.org/protobuf |
CVE-2024-24786 | MEDIUM | v1.30.0 | 1.33.0 |
stdlib |
CVE-2024-24790 | CRITICAL | 1.20.4 | 1.21.11, 1.22.4 |
stdlib |
CVE-2023-29403 | HIGH | 1.20.4 | 1.19.10, 1.20.5 |
stdlib |
CVE-2023-39325 | HIGH | 1.20.4 | 1.20.10, 1.21.3 |
stdlib |
CVE-2023-45283 | HIGH | 1.20.4 | 1.20.11, 1.21.4, 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45288 | HIGH | 1.20.4 | 1.21.9, 1.22.2 |
stdlib |
CVE-2023-29406 | MEDIUM | 1.20.4 | 1.19.11, 1.20.6 |
stdlib |
CVE-2023-29409 | MEDIUM | 1.20.4 | 1.19.12, 1.20.7, 1.21.0-rc.4 |
stdlib |
CVE-2023-39318 | MEDIUM | 1.20.4 | 1.20.8, 1.21.1 |
stdlib |
CVE-2023-39319 | MEDIUM | 1.20.4 | 1.20.8, 1.21.1 |
stdlib |
CVE-2023-39326 | MEDIUM | 1.20.4 | 1.20.12, 1.21.5 |
stdlib |
CVE-2023-45284 | MEDIUM | 1.20.4 | 1.20.11, 1.21.4 |
stdlib |
CVE-2023-45289 | MEDIUM | 1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2023-45290 | MEDIUM | 1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24783 | MEDIUM | 1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24784 | MEDIUM | 1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24785 | MEDIUM | 1.20.4 | 1.21.8, 1.22.1 |
stdlib |
CVE-2024-24789 | MEDIUM | 1.20.4 | 1.21.11, 1.22.4 |
stdlib |
CVE-2024-24791 | MEDIUM | 1.20.4 | 1.21.12, 1.22.5 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bind9-host |
CVE-2024-0760 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-1737 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-1975 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-4076 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-0760 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-1737 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-1975 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-4076 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
libpython3.10 |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10 |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10 |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10 |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-dev |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-dev |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-dev |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-dev |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-minimal |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-minimal |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-minimal |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-minimal |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-stdlib |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-stdlib |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-stdlib |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-stdlib |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
linux-libc-dev |
CVE-2023-52880 | HIGH | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26642 | HIGH | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26828 | HIGH | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26923 | HIGH | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26925 | HIGH | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36016 | HIGH | 5.15.0-113.123 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2022-38096 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52488 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52699 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52752 | MEDIUM | 5.15.0-113.123 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-24861 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-25739 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-25742 | MEDIUM | 5.15.0-113.123 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26629 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26654 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26687 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26810 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26811 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26812 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26813 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26814 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26817 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26886 | MEDIUM | 5.15.0-113.123 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26922 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26926 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26929 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26931 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26934 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26935 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26937 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26950 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26951 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26952 | MEDIUM | 5.15.0-113.123 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26955 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26956 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26957 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26958 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26960 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26961 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26964 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26965 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26966 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26969 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26970 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26973 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26974 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26976 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26977 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26981 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26984 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26988 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26989 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26993 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26994 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26996 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26999 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27000 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27001 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27004 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27008 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27009 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27013 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27015 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27016 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27017 | MEDIUM | 5.15.0-113.123 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-27018 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27019 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27020 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27059 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27393 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27395 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27396 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27437 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35785 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35789 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35791 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35796 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35804 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35805 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35806 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35807 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35809 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35813 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35815 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35817 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35819 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35821 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35822 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35823 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35825 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35847 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35849 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35851 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35852 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35853 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35854 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35855 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35857 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35871 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35872 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35877 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35879 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35884 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35885 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35886 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35888 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35890 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35893 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35895 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35896 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35897 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35898 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35899 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35900 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35902 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35905 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35907 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35910 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35912 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35915 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35918 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35922 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35925 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35930 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35933 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35934 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35935 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35936 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35938 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35940 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35944 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35950 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35955 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35958 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35960 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35969 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35970 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35973 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35976 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35978 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35982 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35984 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35988 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35989 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35990 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35997 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36004 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36005 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36006 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36007 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36008 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36020 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36025 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36029 | MEDIUM | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-23307 | LOW | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24857 | LOW | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24858 | LOW | 5.15.0-113.123 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24859 | LOW | 5.15.0-113.123 | 5.15.0-116.126 |
openssl |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
python3.10 |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10 |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10 |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10 |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-dev |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-dev |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-dev |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-dev |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-minimal |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-minimal |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-minimal |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-minimal |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
No Misconfigurations found
Java
60 known vulnerabilities found (CRITICAL: 2 HIGH: 30 MEDIUM: 22 LOW: 6)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bind9-host |
CVE-2024-0760 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-host |
CVE-2024-1737 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-host |
CVE-2024-1975 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-host |
CVE-2024-4076 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-libs |
CVE-2024-0760 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-libs |
CVE-2024-1737 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-libs |
CVE-2024-1975 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
bind9-libs |
CVE-2024-4076 | MEDIUM | 1:9.16.48-0ubuntu0.20.04.1 | 1:9.18.28-0ubuntu0.20.04.1 |
libc-bin |
CVE-2024-33599 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
libc-bin |
CVE-2024-33600 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
libc-bin |
CVE-2024-33601 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
libc-bin |
CVE-2024-33602 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
libssl1.1 |
CVE-2024-2511 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
libssl1.1 |
CVE-2024-4741 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
libssl1.1 |
CVE-2024-5535 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
locales |
CVE-2024-33599 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
locales |
CVE-2024-33600 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
locales |
CVE-2024-33601 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
locales |
CVE-2024-33602 | MEDIUM | 2.31-0ubuntu9.15 | 2.31-0ubuntu9.16 |
openssl |
CVE-2024-2511 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
openssl |
CVE-2024-4741 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
openssl |
CVE-2024-5535 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
wget |
CVE-2024-38428 | MEDIUM | 1.20.3-1ubuntu2 | 1.20.3-1ubuntu2.1 |
No Misconfigurations found
Java
91 known vulnerabilities found (CRITICAL: 2 HIGH: 41 MEDIUM: 39 LOW: 9)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.17.2 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.17.2 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.100.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
io.vertx:vertx-core |
CVE-2024-1023 | MEDIUM | 4.5.1 | 4.5.2, 4.4.7 |
io.vertx:vertx-core |
CVE-2024-1300 | MEDIUM | 4.5.1 | 4.4.8, 4.5.3 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
libgssapi-krb5-2 |
CVE-2024-37370 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libgssapi-krb5-2 |
CVE-2024-37371 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libk5crypto3 |
CVE-2024-37370 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libk5crypto3 |
CVE-2024-37371 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5-3 |
CVE-2024-37370 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5-3 |
CVE-2024-37371 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5support0 |
CVE-2024-37370 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5support0 |
CVE-2024-37371 | MEDIUM | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
linux-libc-dev |
CVE-2023-52760 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-27397 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39494 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39495 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39496 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40902 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40903 | HIGH | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-25741 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-36894 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-36973 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-36978 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-37078 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-38619 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39298 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39371 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39469 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39474 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39484 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39487 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39499 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39500 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39501 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39502 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39503 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39505 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39506 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39507 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39509 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-39510 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40899 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40900 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40901 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40904 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40905 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40906 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40908 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40910 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40911 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40912 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40913 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40914 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40915 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40916 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40919 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40920 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40921 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40924 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40927 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40929 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40931 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40932 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40934 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40935 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40937 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40938 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40939 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40940 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40941 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40942 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40943 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40947 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40948 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40953 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40954 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40956 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40957 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40958 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40959 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40960 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40961 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40963 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40966 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40967 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40968 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40970 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40971 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40974 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40976 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40977 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40978 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40980 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40981 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40983 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40984 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40987 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40988 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40989 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40990 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40993 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40994 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40995 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-40996 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-41000 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-41001 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-41002 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-41004 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-41005 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
linux-libc-dev |
CVE-2024-41006 | MEDIUM | 6.1.94-1 | 6.1.99-1 |
No Misconfigurations found
Node.js
No Vulnerabilities found
No Misconfigurations found
Python
15 known vulnerabilities found (HIGH: 5 MEDIUM: 9 LOW: 1 CRITICAL: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
Flask-Cors |
CVE-2024-1681 | MEDIUM | 3.0.10 | 4.0.1 |
Jinja2 |
CVE-2024-34064 | MEDIUM | 3.1.3 | 3.1.4 |
Werkzeug |
CVE-2024-34069 | HIGH | 3.0.1 | 3.0.3 |
certifi |
CVE-2024-39689 | LOW | 2023.7.22 | 2024.07.04 |
dnspython |
CVE-2023-29483 | MEDIUM | 2.1.0 | 2.6.1 |
gunicorn |
CVE-2024-1135 | HIGH | 21.2.0 | 22.0.0 |
idna |
CVE-2024-3651 | MEDIUM | 3.2 | 3.7 |
pillow |
CVE-2024-28219 | MEDIUM | 10.2.0 | 10.3.0 |
pip |
CVE-2023-5752 | MEDIUM | 23.0.1 | 23.3 |
requests |
CVE-2024-35195 | MEDIUM | 2.31.0 | 2.32.0 |
setuptools |
CVE-2022-40897 | HIGH | 58.1.0 | 65.5.1 |
setuptools |
CVE-2024-6345 | HIGH | 58.1.0 | 70.0.0 |
sqlparse |
CVE-2024-4340 | HIGH | 0.4.4 | 0.5.0 |
urllib3 |
CVE-2024-37891 | MEDIUM | 1.26.18 | 1.26.19, 2.2.2 |
zipp |
CVE-2024-5569 | MEDIUM | 3.15.0 | 3.19.1 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bsdutils |
CVE-2024-28085 | HIGH | 1:2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libblkid1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libc-bin |
CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
libc-bin |
CVE-2023-4911 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u7 |
libc-bin |
CVE-2024-2961 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u9 |
libc-bin |
CVE-2024-33599 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc-bin |
CVE-2024-33600 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc-bin |
CVE-2024-33601 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc-bin |
CVE-2024-33602 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
libc6 |
CVE-2023-4911 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u7 |
libc6 |
CVE-2024-2961 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u9 |
libc6 |
CVE-2024-33599 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2024-33600 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2024-33601 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2024-33602 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libgnutls30 |
CVE-2022-2509 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u2 |
libgnutls30 |
CVE-2023-0361 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u3 |
libgnutls30 |
CVE-2024-0553 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u5 |
libgnutls30 |
CVE-2024-0567 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u5 |
libgnutls30 |
CVE-2023-5981 | MEDIUM | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u4 |
libgssapi-krb5-2 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libgssapi-krb5-2 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libgssapi-krb5-2 |
CVE-2024-37370 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libgssapi-krb5-2 |
CVE-2024-37371 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libk5crypto3 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libk5crypto3 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libk5crypto3 |
CVE-2024-37370 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libk5crypto3 |
CVE-2024-37371 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5-3 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libkrb5-3 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libkrb5-3 |
CVE-2024-37370 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5-3 |
CVE-2024-37371 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5support0 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libkrb5support0 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libkrb5support0 |
CVE-2024-37370 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5support0 |
CVE-2024-37371 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libmount1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libpcre2-8-0 |
CVE-2022-1586 | CRITICAL | 10.36-2 | 10.36-2+deb11u1 |
libpcre2-8-0 |
CVE-2022-1587 | CRITICAL | 10.36-2 | 10.36-2+deb11u1 |
libsmartcols1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libssl1.1 |
CVE-2022-4450 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0215 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0286 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0464 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2022-4304 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0465 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2023-0466 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2023-2650 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2023-3446 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
libssl1.1 |
CVE-2023-3817 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
libsystemd0 |
CVE-2022-3821 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libsystemd0 |
CVE-2022-4415 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libtasn1-6 |
CVE-2021-46848 | CRITICAL | 4.16.0-2 | 4.16.0-2+deb11u1 |
libtirpc-common |
CVE-2021-46828 | HIGH | 1.3.1-1 | 1.3.1-1+deb11u1 |
libtirpc3 |
CVE-2021-46828 | HIGH | 1.3.1-1 | 1.3.1-1+deb11u1 |
libudev1 |
CVE-2022-3821 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libudev1 |
CVE-2022-4415 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libuuid1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
mount |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
ncurses-base |
CVE-2022-29458 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
ncurses-base |
CVE-2023-29491 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
ncurses-bin |
CVE-2022-29458 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
ncurses-bin |
CVE-2023-29491 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
openssl |
CVE-2022-4450 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0215 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0286 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0464 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2022-4304 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0465 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2023-0466 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2023-2650 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2023-3446 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
openssl |
CVE-2023-3817 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
perl-base |
CVE-2023-47038 | HIGH | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u3 |
tar |
CVE-2022-48303 | LOW | 1.34+dfsg-1 | 1.34+dfsg-1+deb11u1 |
tar |
CVE-2023-39804 | LOW | 1.34+dfsg-1 | 1.34+dfsg-1+deb11u1 |
util-linux |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
zlib1g |
CVE-2022-37434 | CRITICAL | 1:1.2.11.dfsg-2+deb11u1 | 1:1.2.11.dfsg-2+deb11u2 |
No Misconfigurations found
Java
434 known vulnerabilities found (MEDIUM: 136 LOW: 23 CRITICAL: 68 HIGH: 207)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 | CRITICAL | 2.4.0 | 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 | CRITICAL | 2.4.0 | 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 | CRITICAL | 2.4.0 | 2.9.4, 2.8.11, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 | CRITICAL | 2.4.0 | 2.9.4, 2.8.11, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 | CRITICAL | 2.4.0 | 2.6.7.1, 2.7.9.1, 2.8.9 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 | CRITICAL | 2.4.0 | 2.6.7.1, 2.7.9.1, 2.8.9 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.4.0 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.4.0 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.4.0 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.4.0 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 | HIGH | 2.4.0 | 2.8.11.1, 2.9.4, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 | HIGH | 2.4.0 | 2.8.11.1, 2.9.4, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.4.0 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.4.0 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.4.0 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.4.0 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.4.0 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.4.0 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.4.0 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.4.0 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.4.0 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.4.0 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.4.0 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.4.0 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.4.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.4.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.4.0 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.4.0 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 | CRITICAL | 2.9.4 | 2.9.8, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 | CRITICAL | 2.9.4 | 2.7.9.5, 2.9.8, 2.8.11.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.9.4 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.9.4 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.9.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.9.4 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.9.4 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.9.4 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.9.4 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.9.4 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 | CRITICAL | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.9.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.9.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12023 | HIGH | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.9.4 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.9.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.9.4 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 | HIGH | 2.9.4 | 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.9.4 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.9.4 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.9.4 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 | HIGH | 2.9.4 | 2.6.7.4, 2.9.10.7, 2.10.5.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.9.4 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.9.4 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.9.4 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.9.4 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.9.4 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.9.4 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 16.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 16.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 16.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 22.0 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 22.0 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.11.3 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.11.3 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.11.3 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.11.3 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.11.3 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.11.3 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.21.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.21.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.21.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.31 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.21 | 0.27 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.21 | 0.27 |
io.grpc:grpc-protobuf |
CVE-2023-1428 | HIGH | 1.26.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32731 | HIGH | 1.26.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32732 | MEDIUM | 1.26.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-1428 | HIGH | 1.51.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32731 | HIGH | 1.51.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32732 | MEDIUM | 1.51.0 | 1.53.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty-codec-haproxy |
CVE-2022-41881 | MEDIUM | 4.1.77.Final | 4.1.86.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.86.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.77.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.86.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 | HIGH | 1.12.0 | 1.22.0 |
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 | HIGH | 1.12.0 | 1.22.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.druid:druid-core |
CVE-2021-26920 | MEDIUM | 0.17.1 | 0.21.0 |
org.apache.druid:druid-core |
CVE-2021-36749 | MEDIUM | 0.17.1 | 0.22.0 |
org.apache.httpcomponents:httpclient |
CVE-2020-13956 | MEDIUM | 4.5.2 | 4.5.13, 5.0.3 |
org.apache.httpcomponents:httpclient |
CVE-2020-13956 | MEDIUM | 4.5.2 | 4.5.13, 5.0.3 |
org.apache.kafka:kafka-clients |
CVE-2021-38153 | MEDIUM | 2.5.0 | 2.6.3, 2.7.2, 2.8.1 |
org.apache.solr:solr-solrj |
CVE-2023-50298 | LOW | 8.8.2 | 9.4.1, 8.11.3 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.8.3 | 3.8.4, 3.9.2 |
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33202 | MEDIUM | 1.68 | 1.70 |
org.bouncycastle:bcprov-jdk15on |
CVE-2024-29857 | MEDIUM | 1.68 | 1.78 |
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30171 | MEDIUM | 1.68 | 1.78 |
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30172 | MEDIUM | 1.68 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-29857 | MEDIUM | 1.77 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-30171 | MEDIUM | 1.77 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-30172 | MEDIUM | 1.77 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-34447 | LOW | 1.77 | 1.78 |
org.eclipse.jetty.http2:http2-common |
CVE-2024-22201 | HIGH | 9.4.34.v20201102 | 9.4.54, 10.0.20, 11.0.20 |
org.eclipse.jetty.http2:http2-common |
CVE-2023-44487 | MEDIUM | 9.4.34.v20201102 | 9.4.53, 10.0.17, 11.0.17 |
org.eclipse.jetty.http2:http2-hpack |
CVE-2023-36478 | HIGH | 9.4.34.v20201102 | 10.0.16, 11.0.16, 9.4.53 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.45.v20220203 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.45.v20220203 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.45.v20220203 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.45.v20220203 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-server |
CVE-2023-26048 | MEDIUM | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14 |
org.eclipse.jetty:jetty-server |
CVE-2023-26048 | MEDIUM | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14 |
org.eclipse.jetty:jetty-server |
CVE-2023-26049 | LOW | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
org.eclipse.jetty:jetty-server |
CVE-2023-26049 | LOW | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.45.v20220203 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.45.v20220203 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 | MEDIUM | 1.4.10 | 1.4.21 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 | MEDIUM | 1.4.10 | 1.4.21 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 | MEDIUM | 1.4.10 | 1.6.0 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 | MEDIUM | 1.4.10 | 1.6.0 |
org.springframework:spring-expression |
CVE-2023-20863 | HIGH | 5.3.21 | 6.0.8, 5.3.27, 5.2.24.RELEASE |
org.springframework:spring-expression |
CVE-2023-20861 | MEDIUM | 5.3.21 | 6.0.7, 5.3.26, 5.2.23.RELEASE |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.2 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.2 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.2 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bind9-host |
CVE-2024-0760 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-1737 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-1975 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-4076 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-0760 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-1737 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-1975 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-4076 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
libpython3.10 |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10 |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10 |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10 |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-dev |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-dev |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-dev |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-dev |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-minimal |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-minimal |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-minimal |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-minimal |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-stdlib |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-stdlib |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-stdlib |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-stdlib |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libssl3 |
CVE-2022-40735 | MEDIUM | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.16 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libtiff5 |
CVE-2023-3164 | LOW | 4.3.0-6ubuntu0.8 | 4.3.0-6ubuntu0.9 |
linux-libc-dev |
CVE-2023-52447 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52620 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52880 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-6270 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26583 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26584 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26585 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26642 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26643 | HIGH | 5.15.0-107.117 | 5.15.0-113.123 |
linux-libc-dev |
CVE-2024-26809 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26828 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26923 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26924 | HIGH | 5.15.0-107.117 | 5.15.0-113.123 |
linux-libc-dev |
CVE-2024-26925 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36016 | HIGH | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2022-38096 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52434 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52488 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52497 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52640 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52641 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52644 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52645 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52650 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52652 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52656 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52662 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52699 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52752 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2023-7042 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-22099 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-24861 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-25739 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-25742 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26601 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26603 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26629 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26651 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26654 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26659 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26687 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26688 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26733 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26735 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26736 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26737 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26743 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26744 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26747 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26748 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26749 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26750 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26751 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26752 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26754 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26763 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26764 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26766 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26769 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26771 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26772 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26773 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26774 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26776 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26777 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26778 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26779 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26782 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26787 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26788 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26790 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26791 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26792 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26793 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26795 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26798 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26801 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26802 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26803 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26804 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26805 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26810 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26811 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26812 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26813 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26814 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26816 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26817 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26833 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26835 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26838 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26839 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26840 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26843 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26845 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26851 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26852 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26855 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26856 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26857 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26859 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26861 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26862 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26863 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26870 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26874 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26875 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26877 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26878 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26880 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26881 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26882 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26883 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26884 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26885 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26886 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26889 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26891 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26894 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26897 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26898 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26901 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26903 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26907 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26915 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26922 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26926 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26929 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26931 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26934 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26935 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26937 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26950 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26951 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26952 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26955 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26956 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26957 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26958 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26960 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26961 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26964 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26965 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26966 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26969 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26970 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26973 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26974 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26976 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26977 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26981 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26984 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26988 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26989 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26993 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26994 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26996 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26999 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27000 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27001 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27004 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27008 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27009 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27013 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27015 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27016 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27017 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-27018 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27019 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27020 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27024 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27028 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27030 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27034 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27037 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27038 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27039 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27043 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27044 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27045 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27046 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27047 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27051 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27052 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27053 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27054 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27059 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27065 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27073 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27074 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27075 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27076 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27077 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27078 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27388 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27390 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27393 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27395 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27396 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27403 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27405 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27410 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27412 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27413 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27414 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27415 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27416 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27417 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27419 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27431 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27432 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27436 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27437 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35785 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35789 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35791 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35796 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35804 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35805 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35806 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35807 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35809 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35813 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35815 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35817 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35819 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35821 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35822 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35823 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35825 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35828 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35829 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35830 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35844 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35845 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35847 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35849 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35851 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35852 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35853 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35854 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35855 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35857 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35871 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35872 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35877 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35879 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35884 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35885 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35886 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35888 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35890 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35893 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35895 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35896 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35897 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35898 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35899 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35900 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35902 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35905 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35907 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35910 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35912 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35915 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35918 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35922 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35925 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35930 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35933 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35934 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35935 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35936 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35938 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35940 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35944 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35950 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35955 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35958 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35960 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35969 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35970 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35973 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35976 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35978 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35982 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35984 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35988 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35989 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35990 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35997 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36004 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36005 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36006 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36007 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36008 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36020 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36025 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36029 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-0841 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-23307 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24857 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24858 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24859 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26820 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26846 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26872 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26879 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26895 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26906 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
openssl |
CVE-2022-40735 | MEDIUM | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.16 |
openssl |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
python3.10 |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10 |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10 |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10 |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-dev |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-dev |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-dev |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-dev |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-minimal |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-minimal |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-minimal |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-minimal |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
wget |
CVE-2024-38428 | MEDIUM | 1.21.2-2ubuntu1 | 1.21.2-2ubuntu1.1 |
No Misconfigurations found
Java
115 known vulnerabilities found (MEDIUM: 42 LOW: 12 CRITICAL: 4 HIGH: 57)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
gcrane
3 known vulnerabilities found (HIGH: 0 MEDIUM: 2 LOW: 0 CRITICAL: 1)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
github.com/docker/docker |
CVE-2024-41110 | CRITICAL | v24.0.0+incompatible | 23.0.14, 26.1.4, 27.1.0 |
github.com/docker/docker |
CVE-2024-24557 | MEDIUM | v24.0.0+incompatible | 24.0.9, 25.0.2 |
github.com/docker/docker |
GHSA-jq35-85cj-fj4p | MEDIUM | v24.0.0+incompatible | 24.0.7, 23.0.8, 20.10.27 |
No Misconfigurations found
krane
3 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 0 MEDIUM: 2)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
github.com/docker/docker |
CVE-2024-41110 | CRITICAL | v24.0.0+incompatible | 23.0.14, 26.1.4, 27.1.0 |
github.com/docker/docker |
CVE-2024-24557 | MEDIUM | v24.0.0+incompatible | 24.0.9, 25.0.2 |
github.com/docker/docker |
GHSA-jq35-85cj-fj4p | MEDIUM | v24.0.0+incompatible | 24.0.7, 23.0.8, 20.10.27 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Containers/tasks/net8.0/Microsoft.NET.Build.Containers.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/DotnetTools/dotnet-format/dotnet-format.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/DotnetTools/dotnet-user-jwts/8.0.7-servicing.24314.2/tools/net8.0/any/dotnet-user-jwts.deps.json
1 known vulnerabilities found (MEDIUM: 0 LOW: 0 CRITICAL: 0 HIGH: 1)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
System.Formats.Asn1 |
CVE-2024-38095 | HIGH | 5.0.0 | 6.0.1, 8.0.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/DotnetTools/dotnet-user-secrets/8.0.7-servicing.24314.2/tools/net8.0/any/dotnet-user-secrets.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/DotnetTools/dotnet-watch/8.0.107-servicing.24317.5/tools/net8.0/any/dotnet-watch.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/FSharp/fsc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/FSharp/fsi.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/MSBuild.deps.json
1 known vulnerabilities found (HIGH: 0 MEDIUM: 0 LOW: 0 CRITICAL: 1)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/NuGet.CommandLine.XPlat.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Roslyn/Microsoft.Build.Tasks.CodeAnalysis.deps.json
1 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
System.Formats.Asn1 |
CVE-2024-38095 | HIGH | 6.0.0 | 6.0.1, 8.0.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Roslyn/bincore/VBCSCompiler.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Roslyn/bincore/csc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Roslyn/bincore/vbc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Sdks/Microsoft.NET.Sdk.BlazorWebAssembly/tools/net8.0/Microsoft.NET.Sdk.BlazorWebAssembly.Tool.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Sdks/Microsoft.NET.Sdk.Razor/source-generators/Microsoft.NET.Sdk.Razor.SourceGenerators.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Sdks/Microsoft.NET.Sdk.Razor/tools/rzc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/Sdks/Microsoft.NET.Sdk.StaticWebAssets/tools/net8.0/Microsoft.NET.Sdk.StaticWebAssets.Tool.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/datacollector.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/dotnet.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/testhost.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.107/vstest.console.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/shared/Microsoft.AspNetCore.App/8.0.7/Microsoft.AspNetCore.App.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/shared/Microsoft.NETCore.App/8.0.7/Microsoft.NETCore.App.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/local/bin/cosign
1 known vulnerabilities found (MEDIUM: 0 LOW: 0 CRITICAL: 1 HIGH: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
github.com/docker/docker |
CVE-2024-41110 | CRITICAL | v24.0.9+incompatible | 23.0.14, 26.1.4, 27.1.0 |
No Misconfigurations found
usr/local/bin/crane
3 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
github.com/docker/docker |
CVE-2024-41110 | CRITICAL | v24.0.0+incompatible | 23.0.14, 26.1.4, 27.1.0 |
github.com/docker/docker |
CVE-2024-24557 | MEDIUM | v24.0.0+incompatible | 24.0.9, 25.0.2 |
github.com/docker/docker |
GHSA-jq35-85cj-fj4p | MEDIUM | v24.0.0+incompatible | 24.0.7, 23.0.8, 20.10.27 |
No Misconfigurations found
usr/local/bin/helm
1 known vulnerabilities found (LOW: 0 CRITICAL: 1 HIGH: 0 MEDIUM: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
github.com/docker/docker |
CVE-2024-41110 | CRITICAL | v25.0.5+incompatible | 23.0.14, 26.1.4, 27.1.0 |
No Misconfigurations found
usr/local/bin/kubectl
No Vulnerabilities found
No Misconfigurations found
usr/local/bin/mc
No Vulnerabilities found
No Misconfigurations found
This was referenced Aug 1, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==1.34.143
->==1.34.151
1.30.2
->1.30.3
8.8.0
->8.9.1
1.8.1
->1.9.0
==0.13.0
->==0.13.1
0.20.0
->0.20.1
==1.1.0
->==1.3.0
2.2.4
->2.3.0
Release Notes
boto/boto3 (boto3)
v1.34.151
Compare Source
========
appstream
: [botocore
] Added support for Red Hat Enterprise Linux 8 on Amazon AppStream 2.0autoscaling
: [botocore
] Increase the length limit for VPCZoneIdentifier from 2047 to 5000codepipeline
: [botocore
] AWS CodePipeline V2 type pipelines now support stage level conditions to enable development teams to safely release changes that meet quality and compliance requirements.elasticache
: [botocore
] Doc only update for changes to deletion API.elb
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.events
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.lexv2-models
: [botocore
] This release adds new capabilities to the AMAZON.QnAIntent: Custom prompting, Guardrails integration and ExactResponse support for Bedrock Knowledge Base.logs
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.rolesanywhere
: [botocore
] IAM RolesAnywhere now supports custom role session name on the CreateSession. This release adds the acceptRoleSessionName option to a profile to control whether a role session name will be accepted in a session request with a given profile.tnb
: [botocore
] This release adds Network Service Update, through which customers will be able to update their instantiated networks to a new network package. See the documentation for limitations. The release also enhances the Get network operation API to return parameter overrides used during the operation.workspaces
: [botocore
] Removing multi-session as it isn't supported for poolsv1.34.150
Compare Source
========
elasticache
: [botocore
] Renaming full service name as it appears in developer documentation.memorydb
: [botocore
] Renaming full service name as it appears in developer documentation.v1.34.149
Compare Source
========
application-autoscaling
: [botocore
] Application Auto Scaling is now more responsive to the changes in demand of your SageMaker Inference endpoints. To get started, create or update a Target Tracking policy based on High Resolution CloudWatch metrics.application-signals
: [botocore
] CloudWatch Application Signals now supports application logs correlation with traces and operational health metrics of applications running on EC2 instances. Users can view the most relevant telemetry to troubleshoot application health anomalies such as spikes in latency, errors, and availability.bedrock-runtime
: [botocore
] Provides ServiceUnavailableException error messagecodecommit
: [botocore
] CreateRepository API now throws OperationNotAllowedException when the account has been restricted from creating a repository.datazone
: [botocore
] Introduces GetEnvironmentCredentials operation to SDKec2
: [botocore
] EC2 Fleet now supports using custom identifiers to reference Amazon Machine Images (AMI) in launch requests that are configured to choose from a diversified list of instance types.ecr
: [botocore
] API and documentation updates for Amazon ECR, adding support for creating, updating, describing and deleting ECR Repository Creation Template.eks
: [botocore
] This release adds support for EKS cluster to manage extended support.elbv2
: [botocore
] This release adds support for sharing trust stores across accounts and organizations through integration with AWS Resource Access Manager.network-firewall
: [botocore
] You can now log events that are related to TLS inspection, in addition to the existing alert and flow logging.outposts
: [botocore
] Adding default vCPU information to GetOutpostSupportedInstanceTypes and GetOutpostInstanceTypes responsesstepfunctions
: [botocore
] This release adds support to customer managed KMS key encryption in AWS Step Functions.v1.34.148
Compare Source
========
cleanrooms
: [botocore
] Three enhancements to the AWS Clean Rooms: Disallowed Output Columns, Flexible Result Receivers, SQL as a Seeddynamodb
: [botocore
] DynamoDB doc only update for Julyiotsitewise
: [botocore
] Adds support for creating SiteWise Edge gateways that run on a Siemens Industrial Edge Device.mediapackagev2
: [botocore
] This release adds support for Irdeto DRM encryption in DASH manifests.medical-imaging
: [botocore
] CopyImageSet API adds copying selected instances between image sets, and overriding inconsistent metadata with a force parameter. UpdateImageSetMetadata API enables reverting to prior versions; updates to Study, Series, and SOP Instance UIDs; and updates to private elements, with a force parameter.pinpoint-sms-voice-v2
: [botocore
] Update for rebrand to AWS End User Messaging SMS and Voice.v1.34.147
Compare Source
========
appsync
: [botocore
] Adding support for paginators in AppSync list APIscleanrooms
: [botocore
] This release adds AWS Entity Resolution integration to associate ID namespaces & ID mapping workflow resources as part of ID namespace association and ID mapping table in AWS Clean Rooms. It also introduces a new ID_MAPPING_TABLE analysis rule to manage the protection on ID mapping table.cleanroomsml
: [botocore
] Adds SQL query as the source of seed audience for audience generation job.connect
: [botocore
] Added PostContactSummary segment type on ListRealTimeContactAnalysisSegmentsV2 APIconnect-contact-lens
: [botocore
] Added PostContactSummary segment type on ListRealTimeContactAnalysisSegments APIdatazone
: [botocore
] This release removes the deprecated dataProductItem field from Search API output.entityresolution
: [botocore
] Support First Party ID Mappingv1.34.146
Compare Source
========
datazone
: [botocore
] This release adds 1/ support of register S3 locations of assets in AWS Lake Formation hybrid access mode for DefaultDataLake blueprint. 2/ support of CRUD operations for Asset Filters.ivs
: [botocore
] Documentation update for IVS Low Latency API Reference.mobile
: [botocore
] The mobile client has been removed following the deprecation of the service.neptune-graph
: [botocore
] Amazon Neptune Analytics provides new options for customers to start with smaller graphs at a lower cost. CreateGraph, CreaateGraphImportTask, UpdateGraph and StartImportTask APIs will now allow 32 and 64 forprovisioned-memory
redshift-serverless
: [botocore
] Adds dualstack support for Redshift Serverless workgroup.v1.34.145
Compare Source
========
acm-pca
: [botocore
] Fix broken waiters for the acm-pca client. Waiters broke in version 1.13.144 of the Boto3 SDK.connect
: [botocore
] Amazon Connect expands search API coverage for additional resources. Search for hierarchy groups by name, ID, tag, or other criteria (new endpoint). Search for agent statuses by name, ID, tag, or other criteria (new endpoint). Search for users by their assigned proficiencies (enhanced endpoint)ec2
: [botocore
] Amazon VPC IP Address Manager (IPAM) now supports Bring-Your-Own-IP (BYOIP) for IP addresses registered with any Internet Registry. This feature uses DNS TXT records to validate ownership of a public IP address range.firehose
: [botocore
] This release 1) Add configurable buffering hints for Snowflake as destination. 2) Add ReadFromTimestamp for MSK As Source. Firehose will start reading data from MSK Cluster using offset associated with this timestamp. 3) Gated public beta release to add Apache Iceberg tables as destination.ivschat
: [botocore
] Documentation update for IVS Chat API Reference.medialive
: [botocore
] AWS Elemental MediaLive now supports the SRT protocol via the new SRT Caller input type.rds
: [botocore
] Updates Amazon RDS documentation to specify an eventual consistency model for DescribePendingMaintenanceActions.sagemaker
: [botocore
] SageMaker Training supports R5, T3 and R5D instances family. And SageMaker Processing supports G5 and R5D instances family.secretsmanager
: [botocore
] Doc only update for Secrets Managertaxsettings
: [botocore
] Set default endpoint for aws partition. Requests from all regions in aws partition will be forward to us-east-1 endpoint.timestream-query
: [botocore
] Doc-only update for TimestreamQuery. Added guidance about the accepted valid value for the QueryPricingModel parameter.workspaces-thin-client
: [botocore
] Documentation update for WorkSpaces Thin Client.botocore
] Update waiters to handle expected boolean values when matching errors (boto/botocore#3220 <https://github.com/boto/botocore/issues/3220>
__)v1.34.144
Compare Source
========
acm-pca
: [botocore
] Minor refactoring of C2J model for AWS Private CAarc-zonal-shift
: [botocore
] Adds the option to subscribe to get notifications when a zonal autoshift occurs in a region.globalaccelerator
: [botocore
] This feature adds exceptions to the Customer API to avoid throwing Internal Service errorspinpoint
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.quicksight
: [botocore
] Vega ally control options and Support for Reviewed Answers in Topicscurl/curl-container (docker.io/curlimages/curl)
v8.9.1
Compare Source
Changed
v8.9.0
Compare Source
Changed
Mause/duckdb_engine (duckdb_engine)
v0.13.1
Compare Source
Bug Fixes
google/go-containerregistry (google/go-containerregistry)
v0.20.1
Compare Source
What's Changed
remote.Push
by @mattmoor in https://github.com/google/go-containerregistry/pull/1978Full Changelog: google/go-containerregistry@v0.20.0...v0.20.1
sigstore/cosign (sigstore/cosign)
v2.3.0
Compare Source
Features
Bug Fixes
bundleVerified
to true after Rekor verification (Resolves #3740) (#3745)Documentation
Testing
Contributors
Configuration
📅 Schedule: Branch creation - "before 4am on the first day of the month" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.