-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update all non-major dependencies #138
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🦙 MegaLinter status:
|
Descriptor | Linter | Files | Fixed | Errors | Elapsed time |
---|---|---|---|---|---|
✅ ACTION | actionlint | 6 | 0 | 0.03s | |
✅ DOCKERFILE | hadolint | 12 | 0 | 0.53s | |
✅ EDITORCONFIG | editorconfig-checker | 65 | 0 | 0.17s | |
✅ JSON | jsonlint | 6 | 0 | 0.16s | |
prettier | 6 | 1 | 0.92s | ||
✅ JSON | v8r | 6 | 0 | 16.68s | |
markdownlint | 14 | 206 | 0.72s | ||
✅ PYTHON | bandit | 1 | 0 | 1.16s | |
✅ PYTHON | black | 1 | 0 | 0.79s | |
✅ PYTHON | flake8 | 1 | 0 | 0.5s | |
✅ PYTHON | isort | 1 | 0 | 0.27s | |
✅ PYTHON | mypy | 1 | 0 | 2.15s | |
✅ PYTHON | ruff | 1 | 0 | 0.01s | |
✅ REPOSITORY | checkov | yes | no | 14.43s | |
✅ REPOSITORY | gitleaks | yes | no | 0.13s | |
✅ REPOSITORY | git_diff | yes | no | 0.01s | |
✅ REPOSITORY | kics | yes | no | 3.74s | |
✅ REPOSITORY | secretlint | yes | no | 0.95s | |
✅ REPOSITORY | syft | yes | no | 0.64s | |
✅ REPOSITORY | trivy | yes | no | 8.94s | |
✅ REPOSITORY | trivy-sbom | yes | no | 1.04s | |
✅ REPOSITORY | trufflehog | yes | no | 6.75s | |
✅ YAML | prettier | 10 | 0 | 0.59s | |
✅ YAML | v8r | 10 | 0 | 9.3s | |
✅ YAML | yamllint | 10 | 0 | 0.36s |
See detailed report in MegaLinter reports
You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.
1969d92
to
75e6b19
Compare
d1feb8a
to
118e1df
Compare
9a3feda
to
0bc0e42
Compare
cc23452
to
fc45097
Compare
fc45097
to
5227bf8
Compare
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
libssl3t64 |
CVE-2024-6119 | MEDIUM | 3.0.13-0ubuntu3.2 | 3.0.13-0ubuntu3.4 |
openssl |
CVE-2024-6119 | MEDIUM | 3.0.13-0ubuntu3.2 | 3.0.13-0ubuntu3.4 |
No Misconfigurations found
Java
5 known vulnerabilities found (MEDIUM: 1 LOW: 0 CRITICAL: 1 HIGH: 3)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.jayway.jsonpath:json-path |
CVE-2023-51074 | MEDIUM | 2.6.0 | 2.9.0 |
com.mysql:mysql-connector-j |
CVE-2023-22102 | HIGH | 8.0.33 | 8.2.0 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 2.4.7 | 2.4.9 |
org.postgresql:postgresql |
CVE-2024-1597 | CRITICAL | 42.4.3 | 42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
org.xerial:sqlite-jdbc |
CVE-2023-32697 | HIGH | 3.25.2 | 3.41.2.2 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
semantic-release |
CVE-2020-26226 | HIGH | 1.0.0 | 17.2.3 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
curl |
CVE-2024-7264 | MEDIUM | 7.81.0-1ubuntu1.16 | 7.81.0-1ubuntu1.17 |
libcurl4 |
CVE-2024-7264 | MEDIUM | 7.81.0-1ubuntu1.16 | 7.81.0-1ubuntu1.17 |
libgssapi-krb5-2 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libgssapi-krb5-2 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libk5crypto3 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libk5crypto3 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5-3 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5-3 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5support0 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5support0 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libssl3 |
CVE-2024-6119 | MEDIUM | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.18 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-6119 | MEDIUM | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.18 |
openssl |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.16 | 3.0.2-0ubuntu1.17 |
No Misconfigurations found
Java
17 known vulnerabilities found (HIGH: 9 MEDIUM: 2 LOW: 1 CRITICAL: 5)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
ca.uhn.hapi.fhir:org.hl7.fhir.convertors |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.convertors |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may |
CVE-2024-45294 | HIGH | 5.1.0 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.dstu3 |
CVE-2024-45294 | HIGH | 5.1.0 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-45294 | HIGH | 5.1.0 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.r5 |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.r5 |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
ca.uhn.hapi.fhir:org.hl7.fhir.r5 |
CVE-2024-45294 | HIGH | 5.1.0 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-45294 | HIGH | 5.1.0 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.validation |
CVE-2023-24057 | CRITICAL | 5.1.0 | 5.6.92 |
ca.uhn.hapi.fhir:org.hl7.fhir.validation |
CVE-2023-28465 | HIGH | 5.1.0 | 5.6.106 |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 29.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 29.0-jre | 32.0.0-android |
org.apache.commons:commons-text |
CVE-2022-42889 | CRITICAL | 1.7 | 1.10.0 |
org.apache.httpcomponents:httpclient |
CVE-2020-13956 | MEDIUM | 4.5.12 | 4.5.13, 5.0.3 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
glib2 |
CVE-2024-34397 | MEDIUM | 2.68.4-14.el9 | 2.68.4-14.el9_4.1 |
krb5-libs |
CVE-2024-37370 | MEDIUM | 1.21.1-1.el9 | 1.21.1-2.el9_4 |
krb5-libs |
CVE-2024-37371 | MEDIUM | 1.21.1-1.el9 | 1.21.1-2.el9_4 |
python3 |
CVE-2024-6923 | MEDIUM | 3.9.18-3.el9_4.3 | 3.9.18-3.el9_4.5 |
python3-libs |
CVE-2024-6923 | MEDIUM | 3.9.18-3.el9_4.3 | 3.9.18-3.el9_4.5 |
No Misconfigurations found
Java
11 known vulnerabilities found (HIGH: 4 MEDIUM: 7 LOW: 0 CRITICAL: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.12.2 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 | HIGH | 2.12.2 | 2.12.6, 2.13.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.2 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.2 | 2.12.7.1, 2.13.4 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.24 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
org.apache.kafka:kafka-metadata |
CVE-2024-27309 | MEDIUM | 3.5.1 | 3.6.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.8.3 | 3.8.4, 3.9.2 |
org.bitbucket.b_c:jose4j |
CVE-2023-51775 | MEDIUM | 0.9.3 | 0.9.4 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 | MEDIUM | 1.4.10 | 1.4.21 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 | MEDIUM | 1.4.10 | 1.6.0 |
No Misconfigurations found
opt/kafka-exporter/kafka_exporter
3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
stdlib |
CVE-2024-34156 | HIGH | 1.23.0 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34155 | MEDIUM | 1.23.0 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | 1.23.0 | 1.22.7, 1.23.1 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
libssl3 |
CVE-2024-6119 | MEDIUM | 3.0.2-0ubuntu1.17 | 3.0.2-0ubuntu1.18 |
libtiff5 |
CVE-2024-7006 | MEDIUM | 4.3.0-6ubuntu0.9 | 4.3.0-6ubuntu0.10 |
openssl |
CVE-2024-6119 | MEDIUM | 3.0.2-0ubuntu1.17 | 3.0.2-0ubuntu1.18 |
No Misconfigurations found
Java
58 known vulnerabilities found (CRITICAL: 2 HIGH: 26 MEDIUM: 24 LOW: 6)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
curl |
CVE-2024-7264 | MEDIUM | 7.88.1-10+deb12u6 | 7.88.1-10+deb12u7 |
libcurl4 |
CVE-2024-7264 | MEDIUM | 7.88.1-10+deb12u6 | 7.88.1-10+deb12u7 |
libecpg-compat3 |
CVE-2024-7348 | HIGH | 15.7-0+deb12u1 | 15.8-0+deb12u1 |
libecpg-dev |
CVE-2024-7348 | HIGH | 15.7-0+deb12u1 | 15.8-0+deb12u1 |
libecpg6 |
CVE-2024-7348 | HIGH | 15.7-0+deb12u1 | 15.8-0+deb12u1 |
libpgtypes3 |
CVE-2024-7348 | HIGH | 15.7-0+deb12u1 | 15.8-0+deb12u1 |
libpq-dev |
CVE-2024-7348 | HIGH | 15.7-0+deb12u1 | 15.8-0+deb12u1 |
libpq5 |
CVE-2024-7348 | HIGH | 15.7-0+deb12u1 | 15.8-0+deb12u1 |
libssl-dev |
CVE-2024-4603 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
libssl-dev |
CVE-2024-4741 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
libssl-dev |
CVE-2024-6119 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u2 |
libssl-dev |
CVE-2024-2511 | LOW | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
libssl3 |
CVE-2024-4603 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
libssl3 |
CVE-2024-4741 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
libssl3 |
CVE-2024-6119 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u2 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
linux-libc-dev |
CVE-2024-41019 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41030 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41039 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41040 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41046 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41049 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41057 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41058 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41059 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41070 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41073 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41090 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41091 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42271 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42280 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42284 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42285 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42301 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42302 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42313 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43858 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43873 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43882 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43900 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44934 | HIGH | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2023-52889 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-39472 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41012 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41015 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41017 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41020 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41022 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41028 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41034 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41035 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41036 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41038 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41041 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41042 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41044 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41048 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41050 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41051 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41055 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41056 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41060 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41062 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41063 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41064 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41065 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41066 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41069 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41072 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41074 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41075 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41076 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41077 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41078 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41079 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41081 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42114 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42232 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42236 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42237 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42238 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42240 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42244 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42245 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42246 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42247 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42250 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42253 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42258 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42259 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42265 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42267 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42268 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42269 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42270 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42272 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42273 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42274 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42276 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42277 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42281 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42283 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42286 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42287 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42288 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42289 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42290 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42291 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42292 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42295 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42296 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42297 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42299 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42304 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42305 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42306 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42307 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42308 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42309 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42310 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42311 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42312 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42316 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42318 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42320 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-42321 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43817 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43818 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43823 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43828 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43829 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43830 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43832 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43833 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43834 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43837 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43839 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43841 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43842 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43846 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43849 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43851 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43853 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43854 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43855 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43856 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43860 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43861 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43863 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43867 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43869 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43870 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43871 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43875 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43876 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43877 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43879 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43880 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43883 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43885 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43889 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43890 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43893 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43894 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43895 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43897 | MEDIUM | 6.1.99-1 | 6.1.106-3 |
linux-libc-dev |
CVE-2024-43902 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43903 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43905 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43907 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43908 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43909 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43912 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-43914 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44935 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44944 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44948 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44952 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44954 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44958 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44960 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44965 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44966 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44967 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44968 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44969 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44970 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-44971 | MEDIUM | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41007 | LOW | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41027 | LOW | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41047 | LOW | 6.1.99-1 | 6.1.106-1 |
linux-libc-dev |
CVE-2024-41068 | LOW | 6.1.99-1 | 6.1.106-1 |
openssl |
CVE-2024-4603 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
openssl |
CVE-2024-4741 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
openssl |
CVE-2024-6119 | MEDIUM | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u2 |
openssl |
CVE-2024-2511 | LOW | 3.0.13-1~deb12u1 | 3.0.14-1~deb12u1 |
No Misconfigurations found
Node.js
No Vulnerabilities found
No Misconfigurations found
Python
17 known vulnerabilities found (CRITICAL: 0 HIGH: 5 MEDIUM: 10 LOW: 2)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
Flask-AppBuilder |
CVE-2024-45314 | LOW | 4.4.1 | 4.5.1 |
Flask-Cors |
CVE-2024-6221 | HIGH | 3.0.10 | 5.0.0 |
Flask-Cors |
CVE-2024-1681 | MEDIUM | 3.0.10 | 4.0.1 |
Jinja2 |
CVE-2024-34064 | MEDIUM | 3.1.3 | 3.1.4 |
Werkzeug |
CVE-2024-34069 | HIGH | 3.0.1 | 3.0.3 |
certifi |
CVE-2024-39689 | LOW | 2023.7.22 | 2024.07.04 |
cryptography |
GHSA-h4gh-qq45-vh27 | MEDIUM | 42.0.4 | 43.0.1 |
dnspython |
CVE-2023-29483 | MEDIUM | 2.1.0 | 2.6.1 |
gunicorn |
CVE-2024-1135 | HIGH | 21.2.0 | 22.0.0 |
idna |
CVE-2024-3651 | MEDIUM | 3.2 | 3.7 |
pillow |
CVE-2024-28219 | MEDIUM | 10.2.0 | 10.3.0 |
pip |
CVE-2023-5752 | MEDIUM | 23.0.1 | 23.3 |
requests |
CVE-2024-35195 | MEDIUM | 2.31.0 | 2.32.0 |
setuptools |
CVE-2024-6345 | HIGH | 65.5.1 | 70.0.0 |
sqlparse |
CVE-2024-4340 | HIGH | 0.4.4 | 0.5.0 |
urllib3 |
CVE-2024-37891 | MEDIUM | 1.26.18 | 1.26.19, 2.2.2 |
zipp |
CVE-2024-5569 | MEDIUM | 3.15.0 | 3.19.1 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
curl-minimal |
CVE-2024-2398 | MEDIUM | 7.76.1-29.el9_4 | 7.76.1-29.el9_4.1 |
glib2 |
CVE-2024-34397 | MEDIUM | 2.68.4-14.el9 | 2.68.4-14.el9_4.1 |
krb5-libs |
CVE-2024-37370 | MEDIUM | 1.21.1-1.el9 | 1.21.1-2.el9_4 |
krb5-libs |
CVE-2024-37371 | MEDIUM | 1.21.1-1.el9 | 1.21.1-2.el9_4 |
libcurl-minimal |
CVE-2024-2398 | MEDIUM | 7.76.1-29.el9_4 | 7.76.1-29.el9_4.1 |
python-unversioned-command |
CVE-2024-6923 | MEDIUM | 3.9.18-3.el9_4.3 | 3.9.18-3.el9_4.5 |
python3 |
CVE-2024-6923 | MEDIUM | 3.9.18-3.el9_4.3 | 3.9.18-3.el9_4.5 |
python3-libs |
CVE-2024-6923 | MEDIUM | 3.9.18-3.el9_4.3 | 3.9.18-3.el9_4.5 |
python3-setuptools-wheel |
CVE-2024-6345 | HIGH | 53.0.0-12.el9 | 53.0.0-12.el9_4.1 |
No Misconfigurations found
Java
99 known vulnerabilities found (CRITICAL: 21 HIGH: 46 MEDIUM: 30 LOW: 2)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 | CRITICAL | 2.4.0 | 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 | CRITICAL | 2.4.0 | 2.9.4, 2.8.11, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 | CRITICAL | 2.4.0 | 2.6.7.1, 2.7.9.1, 2.8.9 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.4.0 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.4.0 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 | HIGH | 2.4.0 | 2.8.11.1, 2.9.4, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.4.0 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.4.0 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.4.0 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.4.0 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.4.0 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.4.0 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.4.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.4.0 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.jayway.jsonpath:json-path |
CVE-2023-51074 | MEDIUM | 2.8.0 | 2.9.0 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.17.5 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.6.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.87.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.94.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.87.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.94.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.87.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 | HIGH | 1.20.0 | 1.22.0 |
org.apache.calcite:calcite-core |
CVE-2022-39135 | CRITICAL | 1.30.0 | 1.32.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.9.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.9.0 | 2.10.1 |
org.codehaus.jettison:jettison |
CVE-2022-40150 | HIGH | 1.1 | 1.5.2 |
org.codehaus.jettison:jettison |
CVE-2022-45685 | HIGH | 1.1 | 1.5.2 |
org.codehaus.jettison:jettison |
CVE-2022-45693 | HIGH | 1.1 | 1.5.2 |
org.codehaus.jettison:jettison |
CVE-2023-1436 | HIGH | 1.1 | 1.5.4 |
org.codehaus.jettison:jettison |
CVE-2022-40149 | MEDIUM | 1.1 | 1.5.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.50.v20221201 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-server |
CVE-2023-26048 | MEDIUM | 9.4.50.v20221201 | 9.4.51.v20230217, 10.0.14, 11.0.14 |
org.eclipse.jetty:jetty-server |
CVE-2023-26049 | LOW | 9.4.50.v20221201 | 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.50.v20221201 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.iq80.snappy:snappy |
CVE-2024-36124 | MEDIUM | 0.3 | 0.5 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.0.5 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.0.5 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.0.5 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.0.5 | 1.1.10.1 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
curl |
CVE-2024-7264 | MEDIUM | 7.68.0-1ubuntu2.22 | 7.68.0-1ubuntu2.23 |
libcurl4 |
CVE-2024-7264 | MEDIUM | 7.68.0-1ubuntu2.22 | 7.68.0-1ubuntu2.23 |
libk5crypto3 |
CVE-2024-37370 | MEDIUM | 1.17-6ubuntu4.4 | 1.17-6ubuntu4.6 |
libk5crypto3 |
CVE-2024-37371 | MEDIUM | 1.17-6ubuntu4.4 | 1.17-6ubuntu4.6 |
libssl1.1 |
CVE-2024-2511 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
libssl1.1 |
CVE-2024-4741 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
libssl1.1 |
CVE-2024-5535 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
openssl |
CVE-2024-2511 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
openssl |
CVE-2024-4741 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
openssl |
CVE-2024-5535 | LOW | 1.1.1f-1ubuntu2.22 | 1.1.1f-1ubuntu2.23 |
No Misconfigurations found
Java
91 known vulnerabilities found (LOW: 9 CRITICAL: 2 HIGH: 38 MEDIUM: 42)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.17.2 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.17.2 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.100.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
io.vertx:vertx-core |
CVE-2024-1023 | MEDIUM | 4.5.1 | 4.5.2, 4.4.7 |
io.vertx:vertx-core |
CVE-2024-1300 | MEDIUM | 4.5.1 | 4.4.8, 4.5.3 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bsdutils |
CVE-2024-28085 | HIGH | 1:2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libblkid1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libc-bin |
CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
libc-bin |
CVE-2023-4911 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u7 |
libc-bin |
CVE-2024-2961 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u9 |
libc-bin |
CVE-2024-33599 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc-bin |
CVE-2024-33600 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc-bin |
CVE-2024-33601 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc-bin |
CVE-2024-33602 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u4 |
libc6 |
CVE-2023-4911 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u7 |
libc6 |
CVE-2024-2961 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u9 |
libc6 |
CVE-2024-33599 | HIGH | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2024-33600 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2024-33601 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libc6 |
CVE-2024-33602 | MEDIUM | 2.31-13+deb11u3 | 2.31-13+deb11u10 |
libgnutls30 |
CVE-2022-2509 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u2 |
libgnutls30 |
CVE-2023-0361 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u3 |
libgnutls30 |
CVE-2024-0553 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u5 |
libgnutls30 |
CVE-2024-0567 | HIGH | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u5 |
libgnutls30 |
CVE-2023-5981 | MEDIUM | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u4 |
libgnutls30 |
CVE-2024-28834 | MEDIUM | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u6 |
libgnutls30 |
CVE-2024-28835 | MEDIUM | 3.7.1-5+deb11u1 | 3.7.1-5+deb11u6 |
libgssapi-krb5-2 |
CVE-2024-37371 | CRITICAL | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libgssapi-krb5-2 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libgssapi-krb5-2 |
CVE-2024-37370 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libgssapi-krb5-2 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libk5crypto3 |
CVE-2024-37371 | CRITICAL | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libk5crypto3 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libk5crypto3 |
CVE-2024-37370 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libk5crypto3 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libkrb5-3 |
CVE-2024-37371 | CRITICAL | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5-3 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libkrb5-3 |
CVE-2024-37370 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5-3 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libkrb5support0 |
CVE-2024-37371 | CRITICAL | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5support0 |
CVE-2022-42898 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 |
libkrb5support0 |
CVE-2024-37370 | HIGH | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 |
libkrb5support0 |
CVE-2023-36054 | MEDIUM | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 |
libmount1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libpcre2-8-0 |
CVE-2022-1586 | CRITICAL | 10.36-2 | 10.36-2+deb11u1 |
libpcre2-8-0 |
CVE-2022-1587 | CRITICAL | 10.36-2 | 10.36-2+deb11u1 |
libsmartcols1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
libssl1.1 |
CVE-2022-4450 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0215 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0286 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0464 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2022-4304 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
libssl1.1 |
CVE-2023-0465 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2023-0466 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2023-2650 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
libssl1.1 |
CVE-2023-3446 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
libssl1.1 |
CVE-2023-3817 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
libsystemd0 |
CVE-2023-50387 | HIGH | 247.3-7 | 247.3-7+deb11u6 |
libsystemd0 |
CVE-2023-50868 | HIGH | 247.3-7 | 247.3-7+deb11u6 |
libsystemd0 |
CVE-2022-3821 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libsystemd0 |
CVE-2022-4415 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libsystemd0 |
CVE-2023-7008 | MEDIUM | 247.3-7 | 247.3-7+deb11u6 |
libtasn1-6 |
CVE-2021-46848 | CRITICAL | 4.16.0-2 | 4.16.0-2+deb11u1 |
libtirpc-common |
CVE-2021-46828 | HIGH | 1.3.1-1 | 1.3.1-1+deb11u1 |
libtirpc3 |
CVE-2021-46828 | HIGH | 1.3.1-1 | 1.3.1-1+deb11u1 |
libudev1 |
CVE-2023-50387 | HIGH | 247.3-7 | 247.3-7+deb11u6 |
libudev1 |
CVE-2023-50868 | HIGH | 247.3-7 | 247.3-7+deb11u6 |
libudev1 |
CVE-2022-3821 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libudev1 |
CVE-2022-4415 | MEDIUM | 247.3-7 | 247.3-7+deb11u2 |
libudev1 |
CVE-2023-7008 | MEDIUM | 247.3-7 | 247.3-7+deb11u6 |
libuuid1 |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
mount |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
ncurses-base |
CVE-2022-29458 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
ncurses-base |
CVE-2023-29491 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
ncurses-bin |
CVE-2022-29458 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 |
ncurses-bin |
CVE-2023-29491 | HIGH | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 |
openssl |
CVE-2022-4450 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0215 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0286 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0464 | HIGH | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2022-2097 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2022-4304 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u4 |
openssl |
CVE-2023-0465 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2023-0466 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2023-2650 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1n-0+deb11u5 |
openssl |
CVE-2023-3446 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
openssl |
CVE-2023-3817 | MEDIUM | 1.1.1n-0+deb11u3 | 1.1.1v-0~deb11u1 |
perl-base |
CVE-2023-47038 | HIGH | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u3 |
tar |
CVE-2022-48303 | LOW | 1.34+dfsg-1 | 1.34+dfsg-1+deb11u1 |
tar |
CVE-2023-39804 | LOW | 1.34+dfsg-1 | 1.34+dfsg-1+deb11u1 |
util-linux |
CVE-2024-28085 | HIGH | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 |
zlib1g |
CVE-2022-37434 | CRITICAL | 1:1.2.11.dfsg-2+deb11u1 | 1:1.2.11.dfsg-2+deb11u2 |
No Misconfigurations found
Java
435 known vulnerabilities found (CRITICAL: 68 HIGH: 201 MEDIUM: 144 LOW: 22)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 | CRITICAL | 2.4.0 | 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 | CRITICAL | 2.4.0 | 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 | CRITICAL | 2.4.0 | 2.9.4, 2.8.11, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 | CRITICAL | 2.4.0 | 2.9.4, 2.8.11, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 | CRITICAL | 2.4.0 | 2.6.7.1, 2.7.9.1, 2.8.9 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 | CRITICAL | 2.4.0 | 2.6.7.1, 2.7.9.1, 2.8.9 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.4.0 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.4.0 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.4.0 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.4.0 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.4.0 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.4.0 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.4.0 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.4.0 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.4.0 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.4.0 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 | HIGH | 2.4.0 | 2.8.11.1, 2.9.4, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 | HIGH | 2.4.0 | 2.8.11.1, 2.9.4, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.4.0 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.4.0 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.4.0 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.4.0 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.4.0 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.4.0 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.4.0 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.4.0 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.4.0 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.4.0 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.4.0 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.4.0 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.4.0 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.4.0 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.4.0 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.4.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.4.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.4.0 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.4.0 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.4.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.4.0 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 | CRITICAL | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 | CRITICAL | 2.9.4 | 2.9.8, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 | CRITICAL | 2.9.4 | 2.7.9.5, 2.9.8, 2.8.11.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 | CRITICAL | 2.9.4 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.9.4 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.9.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 | CRITICAL | 2.9.4 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 | CRITICAL | 2.9.4 | 2.9.10, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 | CRITICAL | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 | CRITICAL | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.9.4 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 | CRITICAL | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 | CRITICAL | 2.9.4 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 | CRITICAL | 2.9.4 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 | CRITICAL | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.9.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.9.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12023 | HIGH | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 | HIGH | 2.9.4 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 | HIGH | 2.9.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 | HIGH | 2.9.4 | 2.6.7.3, 2.8.11.5, 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 | HIGH | 2.9.4 | 2.9.10 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 | HIGH | 2.9.4 | 2.9.10.4, 2.6.7.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 | HIGH | 2.9.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 | HIGH | 2.9.4 | 2.9.10.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.9.4 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.9.4 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 | HIGH | 2.9.4 | 2.6.7.4, 2.9.10.7, 2.10.5.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.9.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.9.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.9.4 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.9.4 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.9.4 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.9.4 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 | MEDIUM | 2.9.4 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 | MEDIUM | 2.9.4 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 16.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 16.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 16.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 22.0 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 22.0 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 22.0 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 27.0-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 28.2-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.11.3 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.11.3 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.11.3 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.11.3 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.11.3 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.11.3 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.11.3 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.21.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.21.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.21.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.31 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.21 | 0.27 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.21 | 0.27 |
io.grpc:grpc-protobuf |
CVE-2023-1428 | HIGH | 1.26.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32731 | HIGH | 1.26.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32732 | MEDIUM | 1.26.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-1428 | HIGH | 1.51.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32731 | HIGH | 1.51.0 | 1.53.0 |
io.grpc:grpc-protobuf |
CVE-2023-32732 | MEDIUM | 1.51.0 | 1.53.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.5.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.10.6.Final | 4.0.0 |
io.netty:netty-codec-haproxy |
CVE-2022-41881 | MEDIUM | 4.1.77.Final | 4.1.86.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.86.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.89.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.77.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.89.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.86.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.89.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 | HIGH | 1.12.0 | 1.22.0 |
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 | HIGH | 1.12.0 | 1.22.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.8.0 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.druid:druid-core |
CVE-2021-26920 | MEDIUM | 0.17.1 | 0.21.0 |
org.apache.druid:druid-core |
CVE-2021-36749 | MEDIUM | 0.17.1 | 0.22.0 |
org.apache.httpcomponents:httpclient |
CVE-2020-13956 | MEDIUM | 4.5.2 | 4.5.13, 5.0.3 |
org.apache.httpcomponents:httpclient |
CVE-2020-13956 | MEDIUM | 4.5.2 | 4.5.13, 5.0.3 |
org.apache.kafka:kafka-clients |
CVE-2021-38153 | MEDIUM | 2.5.0 | 2.6.3, 2.7.2, 2.8.1 |
org.apache.solr:solr-solrj |
CVE-2023-50298 | MEDIUM | 8.8.2 | 9.4.1, 8.11.3 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.8.3 | 3.8.4, 3.9.2 |
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33202 | MEDIUM | 1.68 | 1.70 |
org.bouncycastle:bcprov-jdk15on |
CVE-2024-29857 | MEDIUM | 1.68 | 1.78 |
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30171 | MEDIUM | 1.68 | 1.78 |
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30172 | MEDIUM | 1.68 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-29857 | MEDIUM | 1.77 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-30171 | MEDIUM | 1.77 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-30172 | MEDIUM | 1.77 | 1.78 |
org.bouncycastle:bcprov-jdk18on |
CVE-2024-34447 | LOW | 1.77 | 1.78 |
org.eclipse.jetty.http2:http2-common |
CVE-2024-22201 | HIGH | 9.4.34.v20201102 | 9.4.54, 10.0.20, 11.0.20 |
org.eclipse.jetty.http2:http2-common |
CVE-2023-44487 | MEDIUM | 9.4.34.v20201102 | 9.4.53, 10.0.17, 11.0.17 |
org.eclipse.jetty.http2:http2-hpack |
CVE-2023-36478 | HIGH | 9.4.34.v20201102 | 10.0.16, 11.0.16, 9.4.53 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.45.v20220203 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.45.v20220203 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.45.v20220203 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.45.v20220203 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.51.v20230217 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-server |
CVE-2023-26048 | MEDIUM | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14 |
org.eclipse.jetty:jetty-server |
CVE-2023-26048 | MEDIUM | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14 |
org.eclipse.jetty:jetty-server |
CVE-2023-26049 | LOW | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
org.eclipse.jetty:jetty-server |
CVE-2023-26049 | LOW | 9.4.45.v20220203 | 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.45.v20220203 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.45.v20220203 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.51.v20230217 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 | MEDIUM | 1.4.10 | 1.4.21 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 | MEDIUM | 1.4.10 | 1.4.21 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 | MEDIUM | 1.4.10 | 1.6.0 |
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 | MEDIUM | 1.4.10 | 1.6.0 |
org.springframework:spring-expression |
CVE-2023-20863 | HIGH | 5.3.21 | 6.0.8, 5.3.27, 5.2.24.RELEASE |
org.springframework:spring-expression |
CVE-2023-20861 | MEDIUM | 5.3.21 | 6.0.7, 5.3.26, 5.2.23.RELEASE |
org.springframework:spring-expression |
CVE-2024-38808 | MEDIUM | 5.3.21 | 5.3.39 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.2 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.2 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.2 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.2 | 1.1.10.1 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bind9-host |
CVE-2024-0760 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-1737 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-1975 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-host |
CVE-2024-4076 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-0760 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-1737 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-1975 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
bind9-libs |
CVE-2024-4076 | MEDIUM | 1:9.18.24-0ubuntu0.22.04.1 | 1:9.18.28-0ubuntu0.22.04.1 |
curl |
CVE-2024-7264 | MEDIUM | 7.81.0-1ubuntu1.16 | 7.81.0-1ubuntu1.17 |
krb5-user |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
krb5-user |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libcurl4 |
CVE-2024-7264 | MEDIUM | 7.81.0-1ubuntu1.16 | 7.81.0-1ubuntu1.17 |
libgssapi-krb5-2 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libgssapi-krb5-2 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libgssrpc4 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libgssrpc4 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libk5crypto3 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libk5crypto3 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkadm5clnt-mit12 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkadm5clnt-mit12 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkadm5srv-mit12 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkadm5srv-mit12 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkdb5-10 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkdb5-10 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5-3 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5-3 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5support0 |
CVE-2024-37370 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libkrb5support0 |
CVE-2024-37371 | MEDIUM | 1.19.2-2ubuntu0.3 | 1.19.2-2ubuntu0.4 |
libpython3.10 |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10 |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10 |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10 |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-dev |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-dev |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-dev |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-dev |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-minimal |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-minimal |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-minimal |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-minimal |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-stdlib |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-stdlib |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libpython3.10-stdlib |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
libpython3.10-stdlib |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
libssl3 |
CVE-2022-40735 | MEDIUM | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.16 |
libssl3 |
CVE-2024-6119 | MEDIUM | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.18 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libssl3 |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
libtiff5 |
CVE-2024-7006 | MEDIUM | 4.3.0-6ubuntu0.8 | 4.3.0-6ubuntu0.10 |
libtiff5 |
CVE-2023-3164 | LOW | 4.3.0-6ubuntu0.8 | 4.3.0-6ubuntu0.9 |
linux-libc-dev |
CVE-2023-20569 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52447 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52620 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52880 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-6270 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26583 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26584 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26585 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26642 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26643 | HIGH | 5.15.0-107.117 | 5.15.0-113.123 |
linux-libc-dev |
CVE-2024-26809 | HIGH | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26828 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26921 | HIGH | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2024-26923 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26924 | HIGH | 5.15.0-107.117 | 5.15.0-113.123 |
linux-libc-dev |
CVE-2024-26925 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26960 | HIGH | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27398 | HIGH | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36016 | HIGH | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2022-38096 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2022-48808 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52434 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52488 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52497 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52585 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2023-52629 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2023-52640 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52641 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52644 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52645 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52650 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52652 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52656 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52662 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2023-52699 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2023-52752 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2023-52760 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2023-52882 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2023-7042 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-21823 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-22099 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-24861 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-25739 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-25742 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26601 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26603 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26629 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26651 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26654 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26659 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26680 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2024-26687 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26688 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26733 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26735 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26736 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26737 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26743 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26744 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26747 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26748 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26749 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26750 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26751 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26752 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26754 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26763 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26764 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26766 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26769 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26771 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26772 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26773 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26774 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26776 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26777 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26778 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26779 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26782 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26787 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26788 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26790 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26791 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26792 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26793 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26795 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26798 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26801 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26802 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26803 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26804 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26805 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26810 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26811 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26812 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26813 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26814 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26816 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26817 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26830 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2024-26833 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26835 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26838 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26839 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26840 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26843 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26845 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26848 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26851 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26852 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26855 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26856 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26857 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26859 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26861 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26862 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26863 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26870 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26874 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26875 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26877 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26878 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26880 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26881 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26882 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26883 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26884 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26885 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26886 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26889 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26891 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26897 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26898 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26900 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-26901 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26903 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26907 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26915 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26922 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26926 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26929 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26931 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26934 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26935 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26936 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-26937 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26950 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26951 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26952 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-26955 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26956 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26957 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26958 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26961 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26964 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26965 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26966 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26969 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26970 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26974 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26976 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26977 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26980 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-26981 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26984 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26988 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26989 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26993 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26994 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26996 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26999 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27000 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27001 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27004 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27008 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27009 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27013 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27015 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27016 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27017 | MEDIUM | 5.15.0-107.117 | 5.15.0-117.127 |
linux-libc-dev |
CVE-2024-27018 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27019 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27020 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27024 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27028 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27030 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27034 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27037 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27038 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27039 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27043 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27044 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27045 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27046 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27047 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27051 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27052 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27053 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27054 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27059 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27065 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27075 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27076 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27077 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27078 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27388 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27390 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27393 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27395 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27396 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27399 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-27401 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-27403 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27405 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27410 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27412 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27413 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27414 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27415 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27416 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27417 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27419 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27431 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27432 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27436 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27437 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35785 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35789 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35791 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35796 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35804 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35805 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35806 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35807 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35809 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35813 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35815 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35817 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35819 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35821 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35822 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35823 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35825 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35828 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35829 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35830 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35844 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35845 | MEDIUM | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-35847 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35848 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-35849 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35851 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35852 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35853 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35854 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35855 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35857 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35871 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35872 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35877 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35879 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35884 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35885 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35886 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35888 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35890 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35893 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35895 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35896 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35897 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35898 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35899 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35900 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35902 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35905 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35907 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35910 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35912 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35915 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35922 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35925 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35930 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35933 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35934 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35935 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35936 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35938 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35940 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35944 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35947 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-35950 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35955 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35958 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35960 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35969 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35970 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35973 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35976 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35978 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35982 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35984 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35988 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35989 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35990 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-35997 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36004 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36005 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36006 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36007 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36008 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36017 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36020 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36025 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36029 | MEDIUM | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-36031 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36880 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36883 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36886 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36889 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36901 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2024-36902 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36904 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36905 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36906 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36916 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36919 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36928 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36929 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36931 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36933 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36934 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36937 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36938 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36939 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36940 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36941 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36944 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36946 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36947 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36950 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36952 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36953 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36954 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36955 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36957 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36959 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36960 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36964 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36965 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36967 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36969 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-36975 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-38600 | MEDIUM | 5.15.0-107.117 | 5.15.0-118.128 |
linux-libc-dev |
CVE-2024-39292 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2024-39484 | MEDIUM | 5.15.0-107.117 | 5.15.0-119.129 |
linux-libc-dev |
CVE-2024-0841 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-23307 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24857 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24858 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-24859 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-26820 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26846 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26872 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26879 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26894 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26895 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26906 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-26973 | LOW | 5.15.0-107.117 | 5.15.0-116.126 |
linux-libc-dev |
CVE-2024-27073 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
linux-libc-dev |
CVE-2024-27074 | LOW | 5.15.0-107.117 | 5.15.0-112.122 |
openssl |
CVE-2022-40735 | MEDIUM | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.16 |
openssl |
CVE-2024-6119 | MEDIUM | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.18 |
openssl |
CVE-2024-2511 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4603 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-4741 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
openssl |
CVE-2024-5535 | LOW | 3.0.2-0ubuntu1.15 | 3.0.2-0ubuntu1.17 |
python3.10 |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10 |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10 |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10 |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-dev |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-dev |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-dev |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-dev |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-minimal |
CVE-2023-6597 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-minimal |
CVE-2024-0397 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
python3.10-minimal |
CVE-2024-0450 | MEDIUM | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.4 |
python3.10-minimal |
CVE-2024-4032 | LOW | 3.10.12-1~22.04.3 | 3.10.12-1~22.04.5 |
wget |
CVE-2024-38428 | MEDIUM | 1.21.2-2ubuntu1 | 1.21.2-2ubuntu1.1 |
No Misconfigurations found
Java
113 known vulnerabilities found (CRITICAL: 4 HIGH: 51 MEDIUM: 46 LOW: 12)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-45294 | HIGH | 6.1.2.2 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-45294 | HIGH | 6.1.2.2 | 6.3.23 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.6.1 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | MEDIUM | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.15.0 | 3.4.0, 1.17.6 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-crjg-w57m-rqqf | MEDIUM | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
GHSA-mmwx-rj87-vfgr | MEDIUM | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.26 | 0.27 |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.77.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.96.Final | 4.1.108.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.77.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.2 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.23.0 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2023-42503 | MEDIUM | 1.23.0 | 1.24.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.23.0 | 1.26.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.3 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.10.3 | 1.1.10.4 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
gcrane
3 known vulnerabilities found (LOW: 0 CRITICAL: 0 HIGH: 1 MEDIUM: 2)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
stdlib |
CVE-2024-34156 | HIGH | 1.21.12 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34155 | MEDIUM | 1.21.12 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | 1.21.12 | 1.22.7, 1.23.1 |
No Misconfigurations found
krane
3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
stdlib |
CVE-2024-34156 | HIGH | 1.21.12 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34155 | MEDIUM | 1.21.12 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | 1.21.12 | 1.22.7, 1.23.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Containers/tasks/net8.0/Microsoft.NET.Build.Containers.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-format/dotnet-format.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-user-jwts/8.0.8-servicing.24369.8/tools/net8.0/any/dotnet-user-jwts.deps.json
1 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
System.Formats.Asn1 |
CVE-2024-38095 | HIGH | 5.0.0 | 6.0.1, 8.0.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-user-secrets/8.0.8-servicing.24369.8/tools/net8.0/any/dotnet-user-secrets.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-watch/8.0.108-servicing.24369.10/tools/net8.0/any/dotnet-watch.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/FSharp/fsc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/FSharp/fsi.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/MSBuild.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/NuGet.CommandLine.XPlat.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Roslyn/Microsoft.Build.Tasks.CodeAnalysis.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Roslyn/bincore/VBCSCompiler.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Roslyn/bincore/csc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Roslyn/bincore/vbc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.BlazorWebAssembly/tools/net8.0/Microsoft.NET.Sdk.BlazorWebAssembly.Tool.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.Razor/source-generators/Microsoft.NET.Sdk.Razor.SourceGenerators.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.Razor/tools/rzc.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.StaticWebAssets/tools/net8.0/Microsoft.NET.Sdk.StaticWebAssets.Tool.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/datacollector.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/dotnet.deps.json
1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
NuGet.Packaging |
CVE-2024-0057 | CRITICAL | 6.8.1-rc.32767 | 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1 |
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/testhost.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/sdk/8.0.108/vstest.console.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/shared/Microsoft.AspNetCore.App/8.0.8/Microsoft.AspNetCore.App.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/lib/dotnet/shared/Microsoft.NETCore.App/8.0.8/Microsoft.NETCore.App.deps.json
No Vulnerabilities found
No Misconfigurations found
usr/local/bin/cosign
5 known vulnerabilities found (CRITICAL: 1 HIGH: 1 MEDIUM: 2 LOW: 1)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
github.com/docker/docker |
CVE-2024-41110 | CRITICAL | v26.1.4+incompatible | 23.0.15, 26.1.5, 27.1.1, 25.0.6 |
github.com/sigstore/sigstore-go |
CVE-2024-45395 | LOW | v0.5.1 | 0.6.1 |
stdlib |
CVE-2024-34156 | HIGH | 1.22.5 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34155 | MEDIUM | 1.22.5 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | 1.22.5 | 1.22.7, 1.23.1 |
No Misconfigurations found
usr/local/bin/crane
3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
stdlib |
CVE-2024-34156 | HIGH | 1.21.12 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34155 | MEDIUM | 1.21.12 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | 1.21.12 | 1.22.7, 1.23.1 |
No Misconfigurations found
usr/local/bin/helm
3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
stdlib |
CVE-2024-34156 | HIGH | 1.22.6 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34155 | MEDIUM | 1.22.6 | 1.22.7, 1.23.1 |
stdlib |
CVE-2024-34158 | MEDIUM | 1.22.6 | 1.22.7, 1.23.1 |
No Misconfigurations found
usr/local/bin/kubectl
No Vulnerabilities found
No Misconfigurations found
usr/local/bin/mc
No Vulnerabilities found
No Misconfigurations found
This was referenced Sep 12, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==1.3.1
->==1.3.2
==1.34.151
->==1.35.17
8.9.0
->8.10.0
==0.18.2
->==0.19.2
1.9.1-spark
->1.9.2-spark
1.30.3
->1.31.0
3.6.0-confluent-hub
->3.8.0-confluent-hub
8.9.1
->8.10.0
3.5.1-scala2.12-java17-python3-ubuntu
->3.5.2-scala2.12-java17-python3-ubuntu
1.9.0
->1.10.0
==1.0.0
->==1.1.0
1.0.0
->1.1.0
==0.13.1
->==0.13.2
0.20.1
->0.20.2
3.15.3
->3.16.0
==4.3.0
->==4.4.0
==1.3.0
->==1.7.0
==3.5.1
->==3.5.2
24.1.0
->24.1.1
2.3.0
->2.4.0
Release Notes
lepture/authlib (Authlib)
v1.3.2
: Version 1.3.2Compare Source
quote
client id and secret.unquote
basic auth header for authorization server.boto/boto3 (boto3)
v1.35.17
Compare Source
=======
bedrock-agent
: [botocore
] Amazon Bedrock Knowledge Bases now supports using inference profiles to increase throughput and improve resilience.bedrock-agent-runtime
: [botocore
] Amazon Bedrock Knowledge Bases now supports using inference profiles to increase throughput and improve resilience.ecr
: [botocore
] Added KMS_DSSE to EncryptionTypeguardduty
: [botocore
] Add support for new statistic types in GetFindingsStatistics.lexv2-models
: [botocore
] Support new Polly voice engines in VoiceSettings: long-form and generativemedialive
: [botocore
] Adds AV1 Codec support, SRT ouputs, and MediaLive Anywhere support.v1.35.16
Compare Source
=======
chime-sdk-voice
: [botocore
] Documentation-only update that clarifies the ValidateE911Address action of the Amazon Chime SDK Voice APIs.cognito-identity
: [botocore
] This release adds sensitive trait to some required shapes.pipes
: [botocore
] This release adds support for customer managed KMS keys in Amazon EventBridge Pipesecurityhub
: [botocore
] Documentation update for Security Hubbotocore
] Update awscrt version to 0.21.5s3
: [botocore
] Adds logic to gracefully handle invalid timestamps returned in the Expires header.v1.35.15
Compare Source
=======
dynamodb
: [botocore
] Doc-only update for DynamoDB. Added information about async behavior for TagResource and UntagResource APIs and updated the description of ResourceInUseException.elbv2
: [botocore
] Add paginators for the ELBv2 DescribeListenerCertificates and DescribeRules APIs. Fix broken waiter for the ELBv2 DescribeLoadBalancers API.ivs-realtime
: [botocore
] IVS Real-Time now offers customers the ability to broadcast to Stages using RTMP(S).kafka
: [botocore
] Amazon MSK Replicator can now replicate data to identically named topics between MSK clusters within the same AWS Region or across different AWS Regions.sagemaker
: [botocore
] Amazon Sagemaker supports orchestrating SageMaker HyperPod clusters with Amazon EKSsagemaker-runtime
: [botocore
] AWS SageMaker Runtime feature: Add sticky routing to support stateful inference models.v1.35.14
Compare Source
=======
qapps
: [botocore
] Adds UpdateLibraryItemMetadata api to change status of app for admin verification feature and returns isVerified field in any api returning the app or library item.v1.35.13
Compare Source
=======
application-signals
: [botocore
] Amazon CloudWatch Application Signals now supports creating Service Level Objectives using a new calculation type. Users can now create SLOs which are configured with request-based SLIs to help meet their specific business requirements.codepipeline
: [botocore
] Updates to add recent notes to APIs and to replace example S3 bucket names globally.connect
: [botocore
] Amazon Connect Custom Vocabulary now supports Catalan (Spain), Danish (Denmark), Dutch (Netherlands), Finnish (Finland), Indonesian (Indonesia), Malay (Malaysia), Norwegian Bokmal (Norway), Polish (Poland), Swedish (Sweden), and Tagalog/Filipino (Philippines).gamelift
: [botocore
] Amazon GameLift provides additional events for tracking the fleet creation process.kinesisanalyticsv2
: [botocore
] Support for Flink 1.20 in Managed Service for Apache Flinksagemaker
: [botocore
] Amazon SageMaker now supports idle shutdown of JupyterLab and CodeEditor applications on SageMaker Studio.v1.35.12
Compare Source
=======
appsync
: [botocore
] Adds new logging levels (INFO and DEBUG) for additional log output controlbedrock-agent
: [botocore
] Add support for user metadata inside PromptVariant.finspace
: [botocore
] Updates Finspace documentation for smaller instances.fis
: [botocore
] This release adds safety levers, a new mechanism to stop all running experiments and prevent new experiments from starting.logs
: [botocore
] Update to support new APIs for delivery of logs from AWS services.s3control
: [botocore
] Amazon Simple Storage Service /S3 Access Grants / Features : This release launches new Access Grants API - ListCallerAccessGrants.v1.35.11
Compare Source
=======
connect
: [botocore
] Release ReplicaConfiguration as part of DescribeInstancedatazone
: [botocore
] Add support to let data publisher specify a subset of the data asset that a subscriber will have access to based on the asset filters provided, when accepting a subscription request.elbv2
: [botocore
] This release adds support for configuring TCP idle timeout on NLB and GWLB listeners.mediaconnect
: [botocore
] AWS Elemental MediaConnect introduces thumbnails for Flow source monitoring. Thumbnails provide still image previews of the live content feeding your MediaConnect Flow allowing you to easily verify that your source is operating as expected.medialive
: [botocore
] Added MinQP as a Rate Control option for H264 and H265 encodes.sagemaker
: [botocore
] Amazon SageMaker now supports automatic mounting of a user's home folder in the Amazon Elastic File System (EFS) associated with the SageMaker Studio domain to their Studio Spaces to enable users to share data between their own private spaces.timestream-influxdb
: [botocore
] Timestream for InfluxDB now supports compute scaling and deployment type conversion. This release adds the DbInstanceType and DeploymentType parameters to the UpdateDbInstance API.v1.35.10
Compare Source
=======
backup
: [botocore
] The latest update introduces two new attributes, VaultType and VaultState, to the DescribeBackupVault and ListBackupVaults APIs. The VaultState attribute reflects the current status of the vault, while the VaultType attribute indicates the specific category of the vault.datazone
: [botocore
] Amazon DataZone now adds new governance capabilities of Domain Units for organization within your Data Domains, and Authorization Policies for tighter controls.logs
: [botocore
] This release introduces a new optional parameter: Entity, in PutLogEvents requestredshift-data
: [botocore
] The release include the new Redshift DataAPI feature for session use, customer execute query with --session-keep-alive-seconds parameter and can submit follow-up queries to same sessions with returnedsession-id
v1.35.9
Compare Source
======
bedrock-agent-runtime
: [botocore
] Lifting the maximum length on Bedrock KnowledgeBase RetrievalFilter arraybedrock-runtime
: [botocore
] Add support for imported-model in invokeModel and InvokeModelWithResponseStream.personalize
: [botocore
] This releases ability to update automatic training scheduler for customer solutionsquicksight
: [botocore
] Increased Character Limit for Dataset Calculation Field expressionsstepfunctions
: [botocore
] This release adds support for static analysis to ValidateStateMachineDefinition API, which can now return optional WARNING diagnostics for semantic errors on the definition of an Amazon States Language (ASL) state machine.wafv2
: [botocore
] The minimum request rate for a rate-based rule is now 10. Before this, it was 100.v1.35.8
Compare Source
======
appconfig
: [botocore
] This release adds support for deletion protection, which is a safety guardrail to prevent the unintentional deletion of a recently used AWS AppConfig Configuration Profile or Environment. This also includes a change to increase the maximum length of the Name parameter in UpdateConfigurationProfile.datazone
: [botocore
] Update regex to include dot character to be consistent with IAM role creation in the authorized principal field for create and update subscription target.devicefarm
: [botocore
] This release removed support for Calabash, UI Automation, Built-in Explorer, remote access record, remote access replay, and web performance profile framework in ScheduleRun API.ec2
: [botocore
] Amazon VPC IP Address Manager (IPAM) now allows customers to provision IPv4 CIDR blocks and allocate Elastic IP Addresses directly from IPAM pools with public IPv4 spaceinternetmonitor
: [botocore
] Adds new querying types to show overall traffic suggestion information for monitorspcs
: [botocore
] Introducing AWS Parallel Computing Service (AWS PCS), a new service makes it easy to setup and manage high performance computing (HPC) clusters, and build scientific and engineering models at virtually any scale on AWS.workspaces
: [botocore
] Documentation-only update that clarifies the StartWorkspaces and StopWorkspaces actions, and a few other minor edits.v1.35.7
Compare Source
======
bedrock
: [botocore
] Amazon Bedrock SDK updates for Inference Profile.bedrock-runtime
: [botocore
] Amazon Bedrock SDK updates for Inference Profile.chatbot
: [botocore
] Update documentation to be consistent with the API docsomics
: [botocore
] Adds data provenance to import jobs from read sets and referencespolly
: [botocore
] Amazon Polly adds 2 new voices: Jitka (cs-CZ) and Sabrina (de-CH).v1.35.6
Compare Source
======
iotsitewise
: [botocore
] AWS IoT SiteWise now supports versioning for asset models. It enables users to retrieve active version of their asset model and perform asset model writes with optimistic lock.workspaces
: [botocore
] This release adds support for creating and managing directories that use AWS IAM Identity Center as user identity source. Such directories can be used to create non-Active Directory domain joined WorkSpaces Personal.Updated RegisterWorkspaceDirectory and DescribeWorkspaceDirectories APIs.v1.35.5
Compare Source
======
bedrock-agent
: [botocore
] Releasing the support for Action User Confirmation.bedrock-agent-runtime
: [botocore
] Releasing the support for Action User Confirmation.codebuild
: [botocore
] Added support for the MAC_ARM environment type for CodeBuild fleets.organizations
: [botocore
] Releasing minor partitional endpoint updates.qbusiness
: [botocore
] Amazon QBusiness: Enable support for SAML and OIDC federation through AWS IAM Identity Provider integration.supplychain
: [botocore
] Update API documentation to clarify the event SLA as well as the data model expectationsv1.35.4
Compare Source
======
autoscaling
: [botocore
] Amazon EC2 Auto Scaling now provides EBS health check to manage EC2 instance replacementbedrock
: [botocore
] Amazon Bedrock Evaluation BatchDeleteEvaluationJob API allows customers to delete evaluation jobs under terminated evaluation job statuses - Stopped, Failed, or Completed. Customers can submit a batch of 25 evaluation jobs to be deleted at once.emr-containers
: [botocore
] Correct endpoint for FIPS is configured for US Gov Regions.inspector2
: [botocore
] Add enums for Agentless scan statuses and EC2 enablement error statesquicksight
: [botocore
] Explicit query for authors and dashboard viewing sharing for embedded usersroute53
: [botocore
] Amazon Route 53 now supports the Asia Pacific (Malaysia) Region (ap-southeast-5) for latency records, geoproximity records, and private DNS for Amazon VPCs in that region.v1.35.3
Compare Source
======
codestar
: [botocore
] The codestar client has been removed following the deprecation of the service on July 31, 2024.ec2
: [botocore
] DescribeInstanceStatus now returns health information on EBS volumes attached to Nitro instancesentityresolution
: [botocore
] Increase the mapping attributes in Schema to 35.glue
: [botocore
] Add optional field JobRunQueuingEnabled to CreateJob and UpdateJob APIs.lambda
: [botocore
] Release FilterCriteria encryption for Lambda EventSourceMapping, enabling customers to encrypt their filter criteria using a customer-owned KMS key.securityhub
: [botocore
] Security Hub documentation and definition updatesses
: [botocore
] Enable email receiving customers to provide SES with access to their S3 buckets via an IAM role for "Deliver to S3 Action"v1.35.2
Compare Source
======
ecs
: [botocore
] Documentation only release to address various ticketsopensearchserverless
: [botocore
] Added FailureCode and FailureMessage to BatchGetCollectionResponse for BatchGetVPCEResponse for non-Active Collection and VPCE.s3
: [botocore
] Amazon Simple Storage Service / Features : Add support for conditional writes for PutObject and CompleteMultipartUpload APIs.v1.35.1
Compare Source
======
bedrock
: [botocore
] Amazon Bedrock Batch Inference/ Model Invocation is a feature which allows customers to asynchronously run inference on a large set of records/files stored in S3.codebuild
: [botocore
] AWS CodeBuild now supports creating fleets with macOS platform for running builds.deadline
: [botocore
] This release adds additional search fields and provides sorting by multiple fields.lambda
: [botocore
] Release Lambda FunctionRecursiveConfig, enabling customers to turn recursive loop detection on or off on individual functions. This release adds two new APIs, GetFunctionRecursionConfig and PutFunctionRecursionConfig.ssm-sap
: [botocore
] Add new attributes to the outputs of GetApplication and GetDatabase APIs.v1.35.0
Compare Source
======
batch
: [botocore
] Improvements of integration between AWS Batch and EC2.inspector2
: [botocore
] Update the correct format of key and values for resource tagsquicksight
: [botocore
] Amazon QuickSight launches Customer Managed Key (CMK) encryption for Data Source metadatasagemaker
: [botocore
] Introduce Endpoint and EndpointConfig Arns in sagemaker:ListPipelineExecutionSteps API responsesesv2
: [botocore
] Marking use case description field of account details as deprecated.botocore
] Adds internal support for the new 'auth' trait to allow a priority list of auth types for a service or operation.v1.34.162
Compare Source
========
docdb
: [botocore
] This release adds Global Cluster Failover capability which enables you to change your global cluster's primary AWS region, the region that serves writes, during a regional outage. Performing a failover action preserves your Global Cluster setup.ecs
: [botocore
] This release introduces a new ContainerDefinition configuration to support the customer-managed keys for ECS container restart feature.iam
: [botocore
] Make the LastUsedDate field in the GetAccessKeyLastUsed response optional. This may break customers who only call the API for access keys with a valid LastUsedDate. This fixes a deserialization issue for access keys without a LastUsedDate, because the field was marked as required but could be null.s3
: [botocore
] Amazon Simple Storage Service / Features : Adds support for pagination in the S3 ListBuckets API.v1.34.161
Compare Source
========
codebuild
: [botocore
] AWS CodeBuild now supports using Secrets Manager to store git credentials and using multiple source credentials in a single project.v1.34.160
Compare Source
========
amplify
: [botocore
] Add a new field "cacheConfig" that enables users to configure the CDN cache settings for an Appappstream
: [botocore
] This release includes following new APIs: CreateThemeForStack, DescribeThemeForStack, UpdateThemeForStack, DeleteThemeForStack to support custom branding programmatically.fis
: [botocore
] This release adds support for additional error information on experiment failure. It adds the error code, location, and account id on relevant failures to the GetExperiment and ListExperiment API responses.glue
: [botocore
] Add AttributesToGet parameter support for Glue GetTablesneptune-graph
: [botocore
] Amazon Neptune Analytics provides a new option for customers to load data into a graph using the RDF (Resource Description Framework) NTRIPLES format. When loading NTRIPLES files, use the valueconvertToIri
for theblankNodeHandling
parameter.v1.34.159
Compare Source
========
compute-optimizer
: [botocore
] Doc only update for Compute Optimizer that fixes several customer-reported issues relating to ECS finding classificationsconfig
: [botocore
] Documentation update for the OrganizationConfigRuleName regex pattern.ec2
: [botocore
] This release adds new capabilities to manage On-Demand Capacity Reservations including the ability to split your reservation, move capacity between reservations, and modify the instance eligibility of your reservation.eks
: [botocore
] Added support for new AL2023 GPU AMIs to the supported AMITypes.groundstation
: [botocore
] Updating documentation for OEMEphemeris to link to AWS Ground Station User Guidemedialive
: [botocore
] AWS Elemental MediaLive now supports now supports editing the PID values for a Multiplex.sagemaker
: [botocore
] Releasing large data support as part of CreateAutoMLJobV2 in SageMaker Autopilot and CreateDomain API for SageMaker Canvas.v1.34.158
Compare Source
========
cognito-idp
: [botocore
] Fixed a description of AdvancedSecurityAdditionalFlows in Amazon Cognito user pool configuration.connect
: [botocore
] This release supports adding RoutingCriteria via UpdateContactRoutingData public API.ssm
: [botocore
] Systems Manager doc-only updates for August 2024.v1.34.157
Compare Source
========
cognito-idp
: [botocore
] Added support for threat protection for custom authentication in Amazon Cognito user pools.connect
: [botocore
] This release fixes a regression in number of access control tags that are allowed to be added to a security profile in Amazon Connect. You can now add up to four access control tags on a single security profile.ec2
: [botocore
] Launch of private IPv6 addressing for VPCs and Subnets. VPC IPAM supports the planning and monitoring of private IPv6 usage.glue
: [botocore
] This release adds support to retrieve the validation status when creating or updating Glue Data Catalog Views. Also added is support for BasicCatalogTarget partition keys.v1.34.156
Compare Source
========
appintegrations
: [botocore
] Updated CreateDataIntegration and CreateDataIntegrationAssociation API to support bulk data export from Amazon Connect Customer Profiles to the customer S3 bucket.glue
: [botocore
] Introducing AWS Glue Data Quality anomaly detection, a new functionality that uses ML-based solutions to detect data anomalies users have not explicitly defined rules for.v1.34.155
Compare Source
========
bedrock-agent-runtime
: [botocore
] Introduce model invocation output traces for orchestration traces, which contain the model's raw response and usage.cognito-idp
: [botocore
] Advanced security feature updates to include password history and log export for Cognito user pools.cost-optimization-hub
: [botocore
] This release adds savings percentage support to the ListRecommendationSummaries API.workspaces
: [botocore
] Added support for BYOL_GRAPHICS_G4DN_WSP IngestionProcessbotocore
] Update awscrt version to 0.21.2v1.34.154
Compare Source
========
datazone
: [botocore
] This releases Data Product feature. Data Products allow grouping data assets into cohesive, self-contained units for ease of publishing for data producers, and ease of finding and accessing for data consumers.ecr
: [botocore
] Released two new APIs along with documentation updates. The GetAccountSetting API is used to view the current basic scan type version setting for your registry, while the PutAccountSetting API is used to update the basic scan type version for your registry.kinesis-video-webrtc-storage
: [botocore
] Add JoinStorageSessionAsViewer APIpi
: [botocore
] Added a description for the Dimension db.sql.tokenized_id on the DimensionGroup data type page.v1.34.153
Compare Source
========
cloudwatch
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.kinesis
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.resiliencehub
: [botocore
] Customers are presented with the grouping recommendations and can determine if the recommendations are accurate and apply to their case. This feature simplifies onboarding by organizing resources into appropriate AppComponents.route53
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.waf-regional
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.v1.34.152
Compare Source
========
bedrock
: [botocore
] API and Documentation for Bedrock Model Copy feature. This feature lets you share and copy a custom model from one region to another or one account to another.controlcatalog
: [botocore
] AWS Control Tower provides two new public APIs controlcatalog:ListControls and controlcatalog:GetControl under controlcatalog service namespace, which enable customers to programmatically retrieve control metadata of available controls.controltower
: [botocore
] Updated Control Tower service documentation for controlcatalog control ARN support with existing Control Tower public APIsiam
: [botocore
] Add v2 smoke tests and smithy smokeTests trait for SDK testing.memorydb
: [botocore
] Doc only update for changes to deletion API.rds
: [botocore
] This release adds support for specifying optional MinACU parameter in CreateDBShardGroup and ModifyDBShardGroup API. DBShardGroup response will contain MinACU if specified.sagemaker
: [botocore
] This release adds support for Amazon EMR Serverless applications in SageMaker Studio for running data processing jobs.ssm-quicksetup
: [botocore
] This release adds API support for the QuickSetup feature of AWS Systems Managersupport
: [botocore
] Doc only updates to CaseDetailscurl/curl-container (curlimages/curl)
v8.10.0
Compare Source
Changed
v8.9.1
Compare Source
Changed
delta-io/delta-rs (deltalake)
v0.19.0
Full Changelog
Implemented enhancements:
Fixed bugs:
write_deltalake
withschema_mode="merge"
casts types #2642Closed issues:
Merged pull requests:
duckdb/duckdb (duckdb)
v1.1.0
: DuckDB 1.1.0 "Eatoni"Compare Source
This release of DuckDB is named "Eatoni" after Eaton's pintail (Anas Eatoni) from the southern Indian Ocean.
Please also refer to the announcement blog post: https://duckdb.org/2024/09/09/announcing-duckdb-110
What's Changed
MultiFileReader
filename configurable by @lnkuiper in https://github.com/duckdb/duckdb/pull/11178feature
by @Tishj in https://github.com/duckdb/duckdb/pull/11082ROW_GROUPS_PER_FILE
for Parquet by @lnkuiper in https://github.com/duckdb/duckdb/pull/11249FileBufferType
by @lnkuiper in https://github.com/duckdb/duckdb/pull/11417schema
input argument toDuckDB.Appender
constructor by @curtd in https://github.com/duckdb/duckdb/pull/12174JEMALLOC_RETAIN
by @lnkuiper in https://github.com/duckdb/duckdb/pull/12185hive_partitioning.hpp
by @Tishj in https://github.com/duckdb/duckdb/pull/12302Configuration
📅 Schedule: Branch creation - "before 4am on the first day of the month" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.