Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update all non-major dependencies #138

Merged
merged 1 commit into from
Sep 12, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 7, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update
Authlib ==1.3.1 -> ==1.3.2 age adoption passing confidence patch
boto3 ==1.34.151 -> ==1.35.17 age adoption passing confidence minor
curlimages/curl 8.9.0 -> 8.10.0 age adoption passing confidence stage minor
deltalake ==0.18.2 -> ==0.19.2 age adoption passing confidence minor
docker.io/apache/kyuubi 1.9.1-spark -> 1.9.2-spark age adoption passing confidence final patch
docker.io/bitnami/kubectl (source) 1.30.3 -> 1.31.0 age adoption passing confidence final minor
docker.io/cricketeerone/apache-kafka-connect 3.6.0-confluent-hub -> 3.8.0-confluent-hub age adoption passing confidence final minor
docker.io/curlimages/curl 8.9.1 -> 8.10.0 age adoption passing confidence stage minor
docker.io/library/spark 3.5.1-scala2.12-java17-python3-ubuntu -> 3.5.2-scala2.12-java17-python3-ubuntu age adoption passing confidence final patch
docker/dockerfile 1.9.0 -> 1.10.0 age adoption passing confidence syntax minor
duckdb (source, changelog) ==1.0.0 -> ==1.1.0 age adoption passing confidence minor
duckdb/duckdb 1.0.0 -> 1.1.0 age adoption passing confidence minor
duckdb_engine (changelog) ==0.13.1 -> ==0.13.2 age adoption passing confidence patch
google/go-containerregistry 0.20.1 -> 0.20.2 age adoption passing confidence patch
helm/helm 3.15.3 -> 3.16.0 age adoption passing confidence minor
jupyter-server-proxy ==4.3.0 -> ==4.4.0 age adoption passing confidence minor
polars (changelog) ==1.3.0 -> ==1.7.0 age adoption passing confidence minor
pyspark (source) ==3.5.1 -> ==3.5.2 age adoption passing confidence patch
semantic-release 24.1.0 -> 24.1.1 age adoption passing confidence dependencies patch
sigstore/cosign 2.3.0 -> 2.4.0 age adoption passing confidence minor

Release Notes

lepture/authlib (Authlib)

v1.3.2: Version 1.3.2

Compare Source

  • Prevent ever-growing session size for OAuth clients.
  • Revert quote client id and secret.
  • unquote basic auth header for authorization server.
boto/boto3 (boto3)

v1.35.17

Compare Source

=======

  • api-change:bedrock-agent: [botocore] Amazon Bedrock Knowledge Bases now supports using inference profiles to increase throughput and improve resilience.
  • api-change:bedrock-agent-runtime: [botocore] Amazon Bedrock Knowledge Bases now supports using inference profiles to increase throughput and improve resilience.
  • api-change:ecr: [botocore] Added KMS_DSSE to EncryptionType
  • api-change:guardduty: [botocore] Add support for new statistic types in GetFindingsStatistics.
  • api-change:lexv2-models: [botocore] Support new Polly voice engines in VoiceSettings: long-form and generative
  • api-change:medialive: [botocore] Adds AV1 Codec support, SRT ouputs, and MediaLive Anywhere support.

v1.35.16

Compare Source

=======

  • api-change:chime-sdk-voice: [botocore] Documentation-only update that clarifies the ValidateE911Address action of the Amazon Chime SDK Voice APIs.
  • api-change:cognito-identity: [botocore] This release adds sensitive trait to some required shapes.
  • api-change:pipes: [botocore] This release adds support for customer managed KMS keys in Amazon EventBridge Pipe
  • api-change:securityhub: [botocore] Documentation update for Security Hub
  • enhancement:AWSCRT: [botocore] Update awscrt version to 0.21.5
  • enhancement:s3: [botocore] Adds logic to gracefully handle invalid timestamps returned in the Expires header.

v1.35.15

Compare Source

=======

  • api-change:dynamodb: [botocore] Doc-only update for DynamoDB. Added information about async behavior for TagResource and UntagResource APIs and updated the description of ResourceInUseException.
  • api-change:elbv2: [botocore] Add paginators for the ELBv2 DescribeListenerCertificates and DescribeRules APIs. Fix broken waiter for the ELBv2 DescribeLoadBalancers API.
  • api-change:ivs-realtime: [botocore] IVS Real-Time now offers customers the ability to broadcast to Stages using RTMP(S).
  • api-change:kafka: [botocore] Amazon MSK Replicator can now replicate data to identically named topics between MSK clusters within the same AWS Region or across different AWS Regions.
  • api-change:sagemaker: [botocore] Amazon Sagemaker supports orchestrating SageMaker HyperPod clusters with Amazon EKS
  • api-change:sagemaker-runtime: [botocore] AWS SageMaker Runtime feature: Add sticky routing to support stateful inference models.

v1.35.14

Compare Source

=======

  • api-change:qapps: [botocore] Adds UpdateLibraryItemMetadata api to change status of app for admin verification feature and returns isVerified field in any api returning the app or library item.

v1.35.13

Compare Source

=======

  • api-change:application-signals: [botocore] Amazon CloudWatch Application Signals now supports creating Service Level Objectives using a new calculation type. Users can now create SLOs which are configured with request-based SLIs to help meet their specific business requirements.
  • api-change:codepipeline: [botocore] Updates to add recent notes to APIs and to replace example S3 bucket names globally.
  • api-change:connect: [botocore] Amazon Connect Custom Vocabulary now supports Catalan (Spain), Danish (Denmark), Dutch (Netherlands), Finnish (Finland), Indonesian (Indonesia), Malay (Malaysia), Norwegian Bokmal (Norway), Polish (Poland), Swedish (Sweden), and Tagalog/Filipino (Philippines).
  • api-change:gamelift: [botocore] Amazon GameLift provides additional events for tracking the fleet creation process.
  • api-change:kinesisanalyticsv2: [botocore] Support for Flink 1.20 in Managed Service for Apache Flink
  • api-change:sagemaker: [botocore] Amazon SageMaker now supports idle shutdown of JupyterLab and CodeEditor applications on SageMaker Studio.

v1.35.12

Compare Source

=======

  • api-change:appsync: [botocore] Adds new logging levels (INFO and DEBUG) for additional log output control
  • api-change:bedrock-agent: [botocore] Add support for user metadata inside PromptVariant.
  • api-change:finspace: [botocore] Updates Finspace documentation for smaller instances.
  • api-change:fis: [botocore] This release adds safety levers, a new mechanism to stop all running experiments and prevent new experiments from starting.
  • api-change:logs: [botocore] Update to support new APIs for delivery of logs from AWS services.
  • api-change:s3control: [botocore] Amazon Simple Storage Service /S3 Access Grants / Features : This release launches new Access Grants API - ListCallerAccessGrants.

v1.35.11

Compare Source

=======

  • api-change:connect: [botocore] Release ReplicaConfiguration as part of DescribeInstance
  • api-change:datazone: [botocore] Add support to let data publisher specify a subset of the data asset that a subscriber will have access to based on the asset filters provided, when accepting a subscription request.
  • api-change:elbv2: [botocore] This release adds support for configuring TCP idle timeout on NLB and GWLB listeners.
  • api-change:mediaconnect: [botocore] AWS Elemental MediaConnect introduces thumbnails for Flow source monitoring. Thumbnails provide still image previews of the live content feeding your MediaConnect Flow allowing you to easily verify that your source is operating as expected.
  • api-change:medialive: [botocore] Added MinQP as a Rate Control option for H264 and H265 encodes.
  • api-change:sagemaker: [botocore] Amazon SageMaker now supports automatic mounting of a user's home folder in the Amazon Elastic File System (EFS) associated with the SageMaker Studio domain to their Studio Spaces to enable users to share data between their own private spaces.
  • api-change:timestream-influxdb: [botocore] Timestream for InfluxDB now supports compute scaling and deployment type conversion. This release adds the DbInstanceType and DeploymentType parameters to the UpdateDbInstance API.

v1.35.10

Compare Source

=======

  • api-change:backup: [botocore] The latest update introduces two new attributes, VaultType and VaultState, to the DescribeBackupVault and ListBackupVaults APIs. The VaultState attribute reflects the current status of the vault, while the VaultType attribute indicates the specific category of the vault.
  • api-change:datazone: [botocore] Amazon DataZone now adds new governance capabilities of Domain Units for organization within your Data Domains, and Authorization Policies for tighter controls.
  • api-change:logs: [botocore] This release introduces a new optional parameter: Entity, in PutLogEvents request
  • api-change:redshift-data: [botocore] The release include the new Redshift DataAPI feature for session use, customer execute query with --session-keep-alive-seconds parameter and can submit follow-up queries to same sessions with returnedsession-id

v1.35.9

Compare Source

======

  • api-change:bedrock-agent-runtime: [botocore] Lifting the maximum length on Bedrock KnowledgeBase RetrievalFilter array
  • api-change:bedrock-runtime: [botocore] Add support for imported-model in invokeModel and InvokeModelWithResponseStream.
  • api-change:personalize: [botocore] This releases ability to update automatic training scheduler for customer solutions
  • api-change:quicksight: [botocore] Increased Character Limit for Dataset Calculation Field expressions
  • api-change:stepfunctions: [botocore] This release adds support for static analysis to ValidateStateMachineDefinition API, which can now return optional WARNING diagnostics for semantic errors on the definition of an Amazon States Language (ASL) state machine.
  • api-change:wafv2: [botocore] The minimum request rate for a rate-based rule is now 10. Before this, it was 100.

v1.35.8

Compare Source

======

  • api-change:appconfig: [botocore] This release adds support for deletion protection, which is a safety guardrail to prevent the unintentional deletion of a recently used AWS AppConfig Configuration Profile or Environment. This also includes a change to increase the maximum length of the Name parameter in UpdateConfigurationProfile.
  • api-change:datazone: [botocore] Update regex to include dot character to be consistent with IAM role creation in the authorized principal field for create and update subscription target.
  • api-change:devicefarm: [botocore] This release removed support for Calabash, UI Automation, Built-in Explorer, remote access record, remote access replay, and web performance profile framework in ScheduleRun API.
  • api-change:ec2: [botocore] Amazon VPC IP Address Manager (IPAM) now allows customers to provision IPv4 CIDR blocks and allocate Elastic IP Addresses directly from IPAM pools with public IPv4 space
  • api-change:internetmonitor: [botocore] Adds new querying types to show overall traffic suggestion information for monitors
  • api-change:pcs: [botocore] Introducing AWS Parallel Computing Service (AWS PCS), a new service makes it easy to setup and manage high performance computing (HPC) clusters, and build scientific and engineering models at virtually any scale on AWS.
  • api-change:workspaces: [botocore] Documentation-only update that clarifies the StartWorkspaces and StopWorkspaces actions, and a few other minor edits.

v1.35.7

Compare Source

======

  • api-change:bedrock: [botocore] Amazon Bedrock SDK updates for Inference Profile.
  • api-change:bedrock-runtime: [botocore] Amazon Bedrock SDK updates for Inference Profile.
  • api-change:chatbot: [botocore] Update documentation to be consistent with the API docs
  • api-change:omics: [botocore] Adds data provenance to import jobs from read sets and references
  • api-change:polly: [botocore] Amazon Polly adds 2 new voices: Jitka (cs-CZ) and Sabrina (de-CH).

v1.35.6

Compare Source

======

  • api-change:iotsitewise: [botocore] AWS IoT SiteWise now supports versioning for asset models. It enables users to retrieve active version of their asset model and perform asset model writes with optimistic lock.
  • api-change:workspaces: [botocore] This release adds support for creating and managing directories that use AWS IAM Identity Center as user identity source. Such directories can be used to create non-Active Directory domain joined WorkSpaces Personal.Updated RegisterWorkspaceDirectory and DescribeWorkspaceDirectories APIs.

v1.35.5

Compare Source

======

  • api-change:bedrock-agent: [botocore] Releasing the support for Action User Confirmation.
  • api-change:bedrock-agent-runtime: [botocore] Releasing the support for Action User Confirmation.
  • api-change:codebuild: [botocore] Added support for the MAC_ARM environment type for CodeBuild fleets.
  • api-change:organizations: [botocore] Releasing minor partitional endpoint updates.
  • api-change:qbusiness: [botocore] Amazon QBusiness: Enable support for SAML and OIDC federation through AWS IAM Identity Provider integration.
  • api-change:supplychain: [botocore] Update API documentation to clarify the event SLA as well as the data model expectations

v1.35.4

Compare Source

======

  • api-change:autoscaling: [botocore] Amazon EC2 Auto Scaling now provides EBS health check to manage EC2 instance replacement
  • api-change:bedrock: [botocore] Amazon Bedrock Evaluation BatchDeleteEvaluationJob API allows customers to delete evaluation jobs under terminated evaluation job statuses - Stopped, Failed, or Completed. Customers can submit a batch of 25 evaluation jobs to be deleted at once.
  • api-change:emr-containers: [botocore] Correct endpoint for FIPS is configured for US Gov Regions.
  • api-change:inspector2: [botocore] Add enums for Agentless scan statuses and EC2 enablement error states
  • api-change:quicksight: [botocore] Explicit query for authors and dashboard viewing sharing for embedded users
  • api-change:route53: [botocore] Amazon Route 53 now supports the Asia Pacific (Malaysia) Region (ap-southeast-5) for latency records, geoproximity records, and private DNS for Amazon VPCs in that region.

v1.35.3

Compare Source

======

  • api-change:codestar: [botocore] The codestar client has been removed following the deprecation of the service on July 31, 2024.
  • api-change:ec2: [botocore] DescribeInstanceStatus now returns health information on EBS volumes attached to Nitro instances
  • api-change:entityresolution: [botocore] Increase the mapping attributes in Schema to 35.
  • api-change:glue: [botocore] Add optional field JobRunQueuingEnabled to CreateJob and UpdateJob APIs.
  • api-change:lambda: [botocore] Release FilterCriteria encryption for Lambda EventSourceMapping, enabling customers to encrypt their filter criteria using a customer-owned KMS key.
  • api-change:securityhub: [botocore] Security Hub documentation and definition updates
  • api-change:ses: [botocore] Enable email receiving customers to provide SES with access to their S3 buckets via an IAM role for "Deliver to S3 Action"

v1.35.2

Compare Source

======

  • api-change:ecs: [botocore] Documentation only release to address various tickets
  • api-change:opensearchserverless: [botocore] Added FailureCode and FailureMessage to BatchGetCollectionResponse for BatchGetVPCEResponse for non-Active Collection and VPCE.
  • api-change:s3: [botocore] Amazon Simple Storage Service / Features : Add support for conditional writes for PutObject and CompleteMultipartUpload APIs.

v1.35.1

Compare Source

======

  • api-change:bedrock: [botocore] Amazon Bedrock Batch Inference/ Model Invocation is a feature which allows customers to asynchronously run inference on a large set of records/files stored in S3.
  • api-change:codebuild: [botocore] AWS CodeBuild now supports creating fleets with macOS platform for running builds.
  • api-change:deadline: [botocore] This release adds additional search fields and provides sorting by multiple fields.
  • api-change:lambda: [botocore] Release Lambda FunctionRecursiveConfig, enabling customers to turn recursive loop detection on or off on individual functions. This release adds two new APIs, GetFunctionRecursionConfig and PutFunctionRecursionConfig.
  • api-change:ssm-sap: [botocore] Add new attributes to the outputs of GetApplication and GetDatabase APIs.

v1.35.0

Compare Source

======

  • api-change:batch: [botocore] Improvements of integration between AWS Batch and EC2.
  • api-change:inspector2: [botocore] Update the correct format of key and values for resource tags
  • api-change:quicksight: [botocore] Amazon QuickSight launches Customer Managed Key (CMK) encryption for Data Source metadata
  • api-change:sagemaker: [botocore] Introduce Endpoint and EndpointConfig Arns in sagemaker:ListPipelineExecutionSteps API response
  • api-change:sesv2: [botocore] Marking use case description field of account details as deprecated.
  • feature:signing: [botocore] Adds internal support for the new 'auth' trait to allow a priority list of auth types for a service or operation.

v1.34.162

Compare Source

========

  • api-change:docdb: [botocore] This release adds Global Cluster Failover capability which enables you to change your global cluster's primary AWS region, the region that serves writes, during a regional outage. Performing a failover action preserves your Global Cluster setup.
  • api-change:ecs: [botocore] This release introduces a new ContainerDefinition configuration to support the customer-managed keys for ECS container restart feature.
  • api-change:iam: [botocore] Make the LastUsedDate field in the GetAccessKeyLastUsed response optional. This may break customers who only call the API for access keys with a valid LastUsedDate. This fixes a deserialization issue for access keys without a LastUsedDate, because the field was marked as required but could be null.
  • api-change:s3: [botocore] Amazon Simple Storage Service / Features : Adds support for pagination in the S3 ListBuckets API.

v1.34.161

Compare Source

========

  • api-change:codebuild: [botocore] AWS CodeBuild now supports using Secrets Manager to store git credentials and using multiple source credentials in a single project.

v1.34.160

Compare Source

========

  • api-change:amplify: [botocore] Add a new field "cacheConfig" that enables users to configure the CDN cache settings for an App
  • api-change:appstream: [botocore] This release includes following new APIs: CreateThemeForStack, DescribeThemeForStack, UpdateThemeForStack, DeleteThemeForStack to support custom branding programmatically.
  • api-change:fis: [botocore] This release adds support for additional error information on experiment failure. It adds the error code, location, and account id on relevant failures to the GetExperiment and ListExperiment API responses.
  • api-change:glue: [botocore] Add AttributesToGet parameter support for Glue GetTables
  • api-change:neptune-graph: [botocore] Amazon Neptune Analytics provides a new option for customers to load data into a graph using the RDF (Resource Description Framework) NTRIPLES format. When loading NTRIPLES files, use the value convertToIri for the blankNodeHandling parameter.

v1.34.159

Compare Source

========

  • api-change:compute-optimizer: [botocore] Doc only update for Compute Optimizer that fixes several customer-reported issues relating to ECS finding classifications
  • api-change:config: [botocore] Documentation update for the OrganizationConfigRuleName regex pattern.
  • api-change:ec2: [botocore] This release adds new capabilities to manage On-Demand Capacity Reservations including the ability to split your reservation, move capacity between reservations, and modify the instance eligibility of your reservation.
  • api-change:eks: [botocore] Added support for new AL2023 GPU AMIs to the supported AMITypes.
  • api-change:groundstation: [botocore] Updating documentation for OEMEphemeris to link to AWS Ground Station User Guide
  • api-change:medialive: [botocore] AWS Elemental MediaLive now supports now supports editing the PID values for a Multiplex.
  • api-change:sagemaker: [botocore] Releasing large data support as part of CreateAutoMLJobV2 in SageMaker Autopilot and CreateDomain API for SageMaker Canvas.

v1.34.158

Compare Source

========

  • api-change:cognito-idp: [botocore] Fixed a description of AdvancedSecurityAdditionalFlows in Amazon Cognito user pool configuration.
  • api-change:connect: [botocore] This release supports adding RoutingCriteria via UpdateContactRoutingData public API.
  • api-change:ssm: [botocore] Systems Manager doc-only updates for August 2024.

v1.34.157

Compare Source

========

  • api-change:cognito-idp: [botocore] Added support for threat protection for custom authentication in Amazon Cognito user pools.
  • api-change:connect: [botocore] This release fixes a regression in number of access control tags that are allowed to be added to a security profile in Amazon Connect. You can now add up to four access control tags on a single security profile.
  • api-change:ec2: [botocore] Launch of private IPv6 addressing for VPCs and Subnets. VPC IPAM supports the planning and monitoring of private IPv6 usage.
  • api-change:glue: [botocore] This release adds support to retrieve the validation status when creating or updating Glue Data Catalog Views. Also added is support for BasicCatalogTarget partition keys.

v1.34.156

Compare Source

========

  • api-change:appintegrations: [botocore] Updated CreateDataIntegration and CreateDataIntegrationAssociation API to support bulk data export from Amazon Connect Customer Profiles to the customer S3 bucket.
  • api-change:glue: [botocore] Introducing AWS Glue Data Quality anomaly detection, a new functionality that uses ML-based solutions to detect data anomalies users have not explicitly defined rules for.

v1.34.155

Compare Source

========

  • api-change:bedrock-agent-runtime: [botocore] Introduce model invocation output traces for orchestration traces, which contain the model's raw response and usage.
  • api-change:cognito-idp: [botocore] Advanced security feature updates to include password history and log export for Cognito user pools.
  • api-change:cost-optimization-hub: [botocore] This release adds savings percentage support to the ListRecommendationSummaries API.
  • api-change:workspaces: [botocore] Added support for BYOL_GRAPHICS_G4DN_WSP IngestionProcess
  • enhancement:AWSCRT: [botocore] Update awscrt version to 0.21.2

v1.34.154

Compare Source

========

  • api-change:datazone: [botocore] This releases Data Product feature. Data Products allow grouping data assets into cohesive, self-contained units for ease of publishing for data producers, and ease of finding and accessing for data consumers.
  • api-change:ecr: [botocore] Released two new APIs along with documentation updates. The GetAccountSetting API is used to view the current basic scan type version setting for your registry, while the PutAccountSetting API is used to update the basic scan type version for your registry.
  • api-change:kinesis-video-webrtc-storage: [botocore] Add JoinStorageSessionAsViewer API
  • api-change:pi: [botocore] Added a description for the Dimension db.sql.tokenized_id on the DimensionGroup data type page.

v1.34.153

Compare Source

========

  • api-change:cloudwatch: [botocore] Add v2 smoke tests and smithy smokeTests trait for SDK testing.
  • api-change:kinesis: [botocore] Add v2 smoke tests and smithy smokeTests trait for SDK testing.
  • api-change:resiliencehub: [botocore] Customers are presented with the grouping recommendations and can determine if the recommendations are accurate and apply to their case. This feature simplifies onboarding by organizing resources into appropriate AppComponents.
  • api-change:route53: [botocore] Add v2 smoke tests and smithy smokeTests trait for SDK testing.
  • api-change:waf-regional: [botocore] Add v2 smoke tests and smithy smokeTests trait for SDK testing.

v1.34.152

Compare Source

========

  • api-change:bedrock: [botocore] API and Documentation for Bedrock Model Copy feature. This feature lets you share and copy a custom model from one region to another or one account to another.
  • api-change:controlcatalog: [botocore] AWS Control Tower provides two new public APIs controlcatalog:ListControls and controlcatalog:GetControl under controlcatalog service namespace, which enable customers to programmatically retrieve control metadata of available controls.
  • api-change:controltower: [botocore] Updated Control Tower service documentation for controlcatalog control ARN support with existing Control Tower public APIs
  • api-change:iam: [botocore] Add v2 smoke tests and smithy smokeTests trait for SDK testing.
  • api-change:memorydb: [botocore] Doc only update for changes to deletion API.
  • api-change:rds: [botocore] This release adds support for specifying optional MinACU parameter in CreateDBShardGroup and ModifyDBShardGroup API. DBShardGroup response will contain MinACU if specified.
  • api-change:sagemaker: [botocore] This release adds support for Amazon EMR Serverless applications in SageMaker Studio for running data processing jobs.
  • api-change:ssm-quicksetup: [botocore] This release adds API support for the QuickSetup feature of AWS Systems Manager
  • api-change:support: [botocore] Doc only updates to CaseDetails
curl/curl-container (curlimages/curl)

v8.10.0

Compare Source

Changed
  • bump to curl 8.10.0
  • bump to alpine:3.20.3

v8.9.1

Compare Source

Changed
  • bump to curl 8.9.1
delta-io/delta-rs (deltalake)

v0.19.0

Full Changelog

Implemented enhancements:

Fixed bugs:

  • Write also insert change types in writer CDC #​2750
  • Regression in Python multiprocessing support #​2744
  • SchemaError occurs during table optimisation after upgrade to v0.18.1 #​2731
  • AWS WebIdentityToken exposure in log files #​2719
  • Write performance degrades with multiple writers #​2683
  • Write monotonic sequence, but read is non monotonic #​2659
  • Python write_deltalake with schema_mode="merge" casts types #​2642
  • Newest docs (potentially) not released #​2587
  • CDC is not generated for Structs and Lists #​2568

Closed issues:

Merged pull requests:

duckdb/duckdb (duckdb)

v1.1.0: DuckDB 1.1.0 "Eatoni"

Compare Source

This release of DuckDB is named "Eatoni" after Eaton's pintail (Anas Eatoni) from the southern Indian Ocean.

Please also refer to the announcement blog post: https://duckdb.org/2024/09/09/announcing-duckdb-110

What's Changed

Configuration

📅 Schedule: Branch creation - "before 4am on the first day of the month" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Aug 7, 2024

🦙 MegaLinter status: ⚠️ WARNING

Descriptor Linter Files Fixed Errors Elapsed time
✅ ACTION actionlint 6 0 0.03s
✅ DOCKERFILE hadolint 12 0 0.53s
✅ EDITORCONFIG editorconfig-checker 65 0 0.17s
✅ JSON jsonlint 6 0 0.16s
⚠️ JSON prettier 6 1 0.92s
✅ JSON v8r 6 0 16.68s
⚠️ MARKDOWN markdownlint 14 206 0.72s
✅ PYTHON bandit 1 0 1.16s
✅ PYTHON black 1 0 0.79s
✅ PYTHON flake8 1 0 0.5s
✅ PYTHON isort 1 0 0.27s
✅ PYTHON mypy 1 0 2.15s
✅ PYTHON ruff 1 0 0.01s
✅ REPOSITORY checkov yes no 14.43s
✅ REPOSITORY gitleaks yes no 0.13s
✅ REPOSITORY git_diff yes no 0.01s
✅ REPOSITORY kics yes no 3.74s
✅ REPOSITORY secretlint yes no 0.95s
✅ REPOSITORY syft yes no 0.64s
✅ REPOSITORY trivy yes no 8.94s
✅ REPOSITORY trivy-sbom yes no 1.04s
✅ REPOSITORY trufflehog yes no 6.75s
✅ YAML prettier 10 0 0.59s
✅ YAML v8r 10 0 9.3s
✅ YAML yamllint 10 0 0.36s

See detailed report in MegaLinter reports

You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.

MegaLinter is graciously provided by OX Security

@renovate renovate bot force-pushed the renovate/all-minor-patch branch 10 times, most recently from 1969d92 to 75e6b19 Compare August 14, 2024 19:18
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 10 times, most recently from d1feb8a to 118e1df Compare August 21, 2024 20:38
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 9 times, most recently from 9a3feda to 0bc0e42 Compare August 26, 2024 22:34
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 4 times, most recently from cc23452 to fc45097 Compare September 11, 2024 15:50
@renovate renovate bot force-pushed the renovate/all-minor-patch branch from fc45097 to 5227bf8 Compare September 11, 2024 23:00
Copy link

Trivy image scan report

ghcr.io/miracum/util-images/cricketeerone-kafka-connect:pr-138 (ubuntu 24.04)

2 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libssl3t64 CVE-2024-6119 MEDIUM 3.0.13-0ubuntu3.2 3.0.13-0ubuntu3.4
openssl CVE-2024-6119 MEDIUM 3.0.13-0ubuntu3.2 3.0.13-0ubuntu3.4

No Misconfigurations found

Java

5 known vulnerabilities found (MEDIUM: 1 LOW: 0 CRITICAL: 1 HIGH: 3)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.jayway.jsonpath:json-path CVE-2023-51074 MEDIUM 2.6.0 2.9.0
com.mysql:mysql-connector-j CVE-2023-22102 HIGH 8.0.33 8.2.0
net.minidev:json-smart CVE-2023-1370 HIGH 2.4.7 2.4.9
org.postgresql:postgresql CVE-2024-1597 CRITICAL 42.4.3 42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2
org.xerial:sqlite-jdbc CVE-2023-32697 HIGH 3.25.2 3.41.2.2

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/semantic-release:pr-138 (debian 12.6)

No Vulnerabilities found

No Misconfigurations found

Node.js

1 known vulnerabilities found (MEDIUM: 0 LOW: 0 CRITICAL: 0 HIGH: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
semantic-release CVE-2020-26226 HIGH 1.0.0 17.2.3

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/dsf-bpe-full:pr-138 (ubuntu 22.04)

20 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 12 LOW: 8)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
curl CVE-2024-7264 MEDIUM 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.17
libcurl4 CVE-2024-7264 MEDIUM 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.17
libgssapi-krb5-2 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libgssapi-krb5-2 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libk5crypto3 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libk5crypto3 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5-3 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5-3 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5support0 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5support0 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libssl3 CVE-2024-6119 MEDIUM 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.18
libssl3 CVE-2024-2511 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
libssl3 CVE-2024-4603 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
libssl3 CVE-2024-4741 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
libssl3 CVE-2024-5535 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
openssl CVE-2024-6119 MEDIUM 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.18
openssl CVE-2024-2511 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
openssl CVE-2024-4603 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
openssl CVE-2024-4741 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17
openssl CVE-2024-5535 LOW 3.0.2-0ubuntu1.16 3.0.2-0ubuntu1.17

No Misconfigurations found

Java

17 known vulnerabilities found (HIGH: 9 MEDIUM: 2 LOW: 1 CRITICAL: 5)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
ca.uhn.hapi.fhir:org.hl7.fhir.convertors CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.convertors CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.dstu3 CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.validation CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.validation CVE-2023-28465 HIGH 5.1.0 5.6.106
com.google.guava:guava CVE-2023-2976 MEDIUM 29.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 29.0-jre 32.0.0-android
org.apache.commons:commons-text CVE-2022-42889 CRITICAL 1.7 1.10.0
org.apache.httpcomponents:httpclient CVE-2020-13956 MEDIUM 4.5.12 4.5.13, 5.0.3

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/strimzi-kafka-connect:pr-138 (redhat 9.4)

5 known vulnerabilities found (MEDIUM: 5 LOW: 0 CRITICAL: 0 HIGH: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
glib2 CVE-2024-34397 MEDIUM 2.68.4-14.el9 2.68.4-14.el9_4.1
krb5-libs CVE-2024-37370 MEDIUM 1.21.1-1.el9 1.21.1-2.el9_4
krb5-libs CVE-2024-37371 MEDIUM 1.21.1-1.el9 1.21.1-2.el9_4
python3 CVE-2024-6923 MEDIUM 3.9.18-3.el9_4.3 3.9.18-3.el9_4.5
python3-libs CVE-2024-6923 MEDIUM 3.9.18-3.el9_4.3 3.9.18-3.el9_4.5

No Misconfigurations found

Java

11 known vulnerabilities found (HIGH: 4 MEDIUM: 7 LOW: 0 CRITICAL: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.12.2 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-46877 HIGH 2.12.2 2.12.6, 2.13.1
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.2 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.2 2.12.7.1, 2.13.4
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.24 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
org.apache.kafka:kafka-metadata CVE-2024-27309 MEDIUM 3.5.1 3.6.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.8.3 3.8.4, 3.9.2
org.bitbucket.b_c:jose4j CVE-2023-51775 MEDIUM 0.9.3 0.9.4
org.jetbrains.kotlin:kotlin-stdlib CVE-2020-29582 MEDIUM 1.4.10 1.4.21
org.jetbrains.kotlin:kotlin-stdlib CVE-2022-24329 MEDIUM 1.4.10 1.6.0

No Misconfigurations found

opt/kafka-exporter/kafka_exporter

3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.23.0 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.23.0 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.23.0 1.22.7, 1.23.1

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/spark-delta:pr-138 (ubuntu 22.04)

3 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 3 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libssl3 CVE-2024-6119 MEDIUM 3.0.2-0ubuntu1.17 3.0.2-0ubuntu1.18
libtiff5 CVE-2024-7006 MEDIUM 4.3.0-6ubuntu0.9 4.3.0-6ubuntu0.10
openssl CVE-2024-6119 MEDIUM 3.0.2-0ubuntu1.17 3.0.2-0ubuntu1.18

No Misconfigurations found

Java

58 known vulnerabilities found (CRITICAL: 2 HIGH: 26 MEDIUM: 24 LOW: 6)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/apache-superset:pr-138 (debian 12.6)

196 known vulnerabilities found (CRITICAL: 0 HIGH: 31 MEDIUM: 158 LOW: 7)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
curl CVE-2024-7264 MEDIUM 7.88.1-10+deb12u6 7.88.1-10+deb12u7
libcurl4 CVE-2024-7264 MEDIUM 7.88.1-10+deb12u6 7.88.1-10+deb12u7
libecpg-compat3 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libecpg-dev CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libecpg6 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libpgtypes3 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libpq-dev CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libpq5 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libssl-dev CVE-2024-4603 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl-dev CVE-2024-4741 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl-dev CVE-2024-6119 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u2
libssl-dev CVE-2024-2511 LOW 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl3 CVE-2024-4603 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl3 CVE-2024-4741 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl3 CVE-2024-6119 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u2
libssl3 CVE-2024-2511 LOW 3.0.13-1~deb12u1 3.0.14-1~deb12u1
linux-libc-dev CVE-2024-41019 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41030 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41039 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41040 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41046 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41049 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41057 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41058 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41059 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41070 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41073 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41090 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41091 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42271 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42280 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42284 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42285 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42301 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42302 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42313 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43858 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43873 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43882 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43900 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44934 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2023-52889 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-39472 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41012 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41015 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41017 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41020 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41022 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41028 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41034 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41035 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41036 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41038 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41041 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41042 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41044 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41048 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41050 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41051 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41055 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41056 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41060 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41062 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41063 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41064 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41065 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41066 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41069 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41072 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41074 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41075 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41076 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41077 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41078 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41079 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41081 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42114 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42232 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42236 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42237 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42238 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42240 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42244 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42245 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42246 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42247 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42250 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42253 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42258 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42259 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42265 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42267 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42268 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42269 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42270 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42272 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42273 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42274 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42276 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42277 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42281 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42283 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42286 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42287 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42288 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42289 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42290 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42291 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42292 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42295 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42296 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42297 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42299 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42304 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42305 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42306 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42307 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42308 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42309 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42310 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42311 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42312 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42316 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42318 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42320 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42321 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43817 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43818 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43823 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43828 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43829 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43830 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43832 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43833 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43834 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43837 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43839 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43841 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43842 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43846 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43849 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43851 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43853 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43854 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43855 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43856 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43860 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43861 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43863 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43867 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43869 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43870 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43871 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43875 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43876 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43877 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43879 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43880 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43883 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43885 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43889 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43890 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43893 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43894 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43895 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43897 MEDIUM 6.1.99-1 6.1.106-3
linux-libc-dev CVE-2024-43902 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43903 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43905 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43907 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43908 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43909 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43912 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43914 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44935 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44944 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44948 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44952 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44954 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44958 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44960 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44965 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44966 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44967 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44968 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44969 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44970 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44971 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41007 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41027 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41047 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41068 LOW 6.1.99-1 6.1.106-1
openssl CVE-2024-4603 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
openssl CVE-2024-4741 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
openssl CVE-2024-6119 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u2
openssl CVE-2024-2511 LOW 3.0.13-1~deb12u1 3.0.14-1~deb12u1

No Misconfigurations found

Node.js

No Vulnerabilities found

No Misconfigurations found

Python

17 known vulnerabilities found (CRITICAL: 0 HIGH: 5 MEDIUM: 10 LOW: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
Flask-AppBuilder CVE-2024-45314 LOW 4.4.1 4.5.1
Flask-Cors CVE-2024-6221 HIGH 3.0.10 5.0.0
Flask-Cors CVE-2024-1681 MEDIUM 3.0.10 4.0.1
Jinja2 CVE-2024-34064 MEDIUM 3.1.3 3.1.4
Werkzeug CVE-2024-34069 HIGH 3.0.1 3.0.3
certifi CVE-2024-39689 LOW 2023.7.22 2024.07.04
cryptography GHSA-h4gh-qq45-vh27 MEDIUM 42.0.4 43.0.1
dnspython CVE-2023-29483 MEDIUM 2.1.0 2.6.1
gunicorn CVE-2024-1135 HIGH 21.2.0 22.0.0
idna CVE-2024-3651 MEDIUM 3.2 3.7
pillow CVE-2024-28219 MEDIUM 10.2.0 10.3.0
pip CVE-2023-5752 MEDIUM 23.0.1 23.3
requests CVE-2024-35195 MEDIUM 2.31.0 2.32.0
setuptools CVE-2024-6345 HIGH 65.5.1 70.0.0
sqlparse CVE-2024-4340 HIGH 0.4.4 0.5.0
urllib3 CVE-2024-37891 MEDIUM 1.26.18 1.26.19, 2.2.2
zipp CVE-2024-5569 MEDIUM 3.15.0 3.19.1

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/trino:pr-138 (redhat 9.4)

9 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 8 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
curl-minimal CVE-2024-2398 MEDIUM 7.76.1-29.el9_4 7.76.1-29.el9_4.1
glib2 CVE-2024-34397 MEDIUM 2.68.4-14.el9 2.68.4-14.el9_4.1
krb5-libs CVE-2024-37370 MEDIUM 1.21.1-1.el9 1.21.1-2.el9_4
krb5-libs CVE-2024-37371 MEDIUM 1.21.1-1.el9 1.21.1-2.el9_4
libcurl-minimal CVE-2024-2398 MEDIUM 7.76.1-29.el9_4 7.76.1-29.el9_4.1
python-unversioned-command CVE-2024-6923 MEDIUM 3.9.18-3.el9_4.3 3.9.18-3.el9_4.5
python3 CVE-2024-6923 MEDIUM 3.9.18-3.el9_4.3 3.9.18-3.el9_4.5
python3-libs CVE-2024-6923 MEDIUM 3.9.18-3.el9_4.3 3.9.18-3.el9_4.5
python3-setuptools-wheel CVE-2024-6345 HIGH 53.0.0-12.el9 53.0.0-12.el9_4.1

No Misconfigurations found

Java

99 known vulnerabilities found (CRITICAL: 21 HIGH: 46 MEDIUM: 30 LOW: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2017-15095 CRITICAL 2.4.0 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-17485 CRITICAL 2.4.0 2.9.4, 2.8.11, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-7525 CRITICAL 2.4.0 2.6.7.1, 2.7.9.1, 2.8.9
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.4.0 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.4.0 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.4.0 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-5968 HIGH 2.4.0 2.8.11.1, 2.9.4, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.4.0 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.4.0 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.4.0 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.4.0 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.4.0 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.4.0 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.4.0 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.4.0 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.4.0 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.4.0 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.jayway.jsonpath:json-path CVE-2023-51074 MEDIUM 2.8.0 2.9.0
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.17.5 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.6.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.87.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.94.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.87.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.94.Final 4.1.100.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.87.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.calcite.avatica:avatica-core CVE-2022-36364 HIGH 1.20.0 1.22.0
org.apache.calcite:calcite-core CVE-2022-39135 CRITICAL 1.30.0 1.32.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.9.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.9.0 2.10.1
org.codehaus.jettison:jettison CVE-2022-40150 HIGH 1.1 1.5.2
org.codehaus.jettison:jettison CVE-2022-45685 HIGH 1.1 1.5.2
org.codehaus.jettison:jettison CVE-2022-45693 HIGH 1.1 1.5.2
org.codehaus.jettison:jettison CVE-2023-1436 HIGH 1.1 1.5.4
org.codehaus.jettison:jettison CVE-2022-40149 MEDIUM 1.1 1.5.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.50.v20221201 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-server CVE-2023-26048 MEDIUM 9.4.50.v20221201 9.4.51.v20230217, 10.0.14, 11.0.14
org.eclipse.jetty:jetty-server CVE-2023-26049 LOW 9.4.50.v20221201 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.50.v20221201 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.iq80.snappy:snappy CVE-2024-36124 MEDIUM 0.3 0.5
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.0.5 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.0.5 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.0.5 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.0.5 1.1.10.1

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/kyuubi-delta:pr-138 (ubuntu 20.04)

10 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 4 LOW: 6)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
curl CVE-2024-7264 MEDIUM 7.68.0-1ubuntu2.22 7.68.0-1ubuntu2.23
libcurl4 CVE-2024-7264 MEDIUM 7.68.0-1ubuntu2.22 7.68.0-1ubuntu2.23
libk5crypto3 CVE-2024-37370 MEDIUM 1.17-6ubuntu4.4 1.17-6ubuntu4.6
libk5crypto3 CVE-2024-37371 MEDIUM 1.17-6ubuntu4.4 1.17-6ubuntu4.6
libssl1.1 CVE-2024-2511 LOW 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23
libssl1.1 CVE-2024-4741 LOW 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23
libssl1.1 CVE-2024-5535 LOW 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23
openssl CVE-2024-2511 LOW 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23
openssl CVE-2024-4741 LOW 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23
openssl CVE-2024-5535 LOW 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23

No Misconfigurations found

Java

91 known vulnerabilities found (LOW: 9 CRITICAL: 2 HIGH: 38 MEDIUM: 42)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.17.2 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.17.2 3.4.0, 1.17.6
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
io.airlift:aircompressor CVE-2024-36114 HIGH 0.26 0.27
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.100.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
io.vertx:vertx-core CVE-2024-1023 MEDIUM 4.5.1 4.5.2, 4.4.7
io.vertx:vertx-core CVE-2024-1300 MEDIUM 4.5.1 4.4.8, 4.5.3
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.10.3 1.1.10.4
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/hive-metastore:pr-138 (debian 11.4)

89 known vulnerabilities found (CRITICAL: 8 HIGH: 46 MEDIUM: 33 LOW: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
bsdutils CVE-2024-28085 HIGH 1:2.36.1-8+deb11u1 2.36.1-8+deb11u2
libblkid1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libc-bin CVE-2021-3999 HIGH 2.31-13+deb11u3 2.31-13+deb11u4
libc-bin CVE-2023-4911 HIGH 2.31-13+deb11u3 2.31-13+deb11u7
libc-bin CVE-2024-2961 HIGH 2.31-13+deb11u3 2.31-13+deb11u9
libc-bin CVE-2024-33599 HIGH 2.31-13+deb11u3 2.31-13+deb11u10
libc-bin CVE-2024-33600 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc-bin CVE-2024-33601 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc-bin CVE-2024-33602 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2021-3999 HIGH 2.31-13+deb11u3 2.31-13+deb11u4
libc6 CVE-2023-4911 HIGH 2.31-13+deb11u3 2.31-13+deb11u7
libc6 CVE-2024-2961 HIGH 2.31-13+deb11u3 2.31-13+deb11u9
libc6 CVE-2024-33599 HIGH 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2024-33600 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2024-33601 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2024-33602 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libgnutls30 CVE-2022-2509 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u2
libgnutls30 CVE-2023-0361 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u3
libgnutls30 CVE-2024-0553 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u5
libgnutls30 CVE-2024-0567 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u5
libgnutls30 CVE-2023-5981 MEDIUM 3.7.1-5+deb11u1 3.7.1-5+deb11u4
libgnutls30 CVE-2024-28834 MEDIUM 3.7.1-5+deb11u1 3.7.1-5+deb11u6
libgnutls30 CVE-2024-28835 MEDIUM 3.7.1-5+deb11u1 3.7.1-5+deb11u6
libgssapi-krb5-2 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libgssapi-krb5-2 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libgssapi-krb5-2 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libgssapi-krb5-2 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libk5crypto3 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libk5crypto3 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libk5crypto3 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libk5crypto3 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libkrb5-3 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5-3 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libkrb5-3 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5-3 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libkrb5support0 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5support0 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libkrb5support0 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5support0 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libmount1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libpcre2-8-0 CVE-2022-1586 CRITICAL 10.36-2 10.36-2+deb11u1
libpcre2-8-0 CVE-2022-1587 CRITICAL 10.36-2 10.36-2+deb11u1
libsmartcols1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libssl1.1 CVE-2022-4450 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0215 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0286 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0464 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2022-2097 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2022-4304 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0465 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2023-0466 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2023-2650 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2023-3446 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
libssl1.1 CVE-2023-3817 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
libsystemd0 CVE-2023-50387 HIGH 247.3-7 247.3-7+deb11u6
libsystemd0 CVE-2023-50868 HIGH 247.3-7 247.3-7+deb11u6
libsystemd0 CVE-2022-3821 MEDIUM 247.3-7 247.3-7+deb11u2
libsystemd0 CVE-2022-4415 MEDIUM 247.3-7 247.3-7+deb11u2
libsystemd0 CVE-2023-7008 MEDIUM 247.3-7 247.3-7+deb11u6
libtasn1-6 CVE-2021-46848 CRITICAL 4.16.0-2 4.16.0-2+deb11u1
libtirpc-common CVE-2021-46828 HIGH 1.3.1-1 1.3.1-1+deb11u1
libtirpc3 CVE-2021-46828 HIGH 1.3.1-1 1.3.1-1+deb11u1
libudev1 CVE-2023-50387 HIGH 247.3-7 247.3-7+deb11u6
libudev1 CVE-2023-50868 HIGH 247.3-7 247.3-7+deb11u6
libudev1 CVE-2022-3821 MEDIUM 247.3-7 247.3-7+deb11u2
libudev1 CVE-2022-4415 MEDIUM 247.3-7 247.3-7+deb11u2
libudev1 CVE-2023-7008 MEDIUM 247.3-7 247.3-7+deb11u6
libuuid1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
mount CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
ncurses-base CVE-2022-29458 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u1
ncurses-base CVE-2023-29491 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u2
ncurses-bin CVE-2022-29458 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u1
ncurses-bin CVE-2023-29491 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u2
openssl CVE-2022-4450 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0215 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0286 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0464 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2022-2097 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2022-4304 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0465 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2023-0466 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2023-2650 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2023-3446 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
openssl CVE-2023-3817 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
perl-base CVE-2023-47038 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u3
tar CVE-2022-48303 LOW 1.34+dfsg-1 1.34+dfsg-1+deb11u1
tar CVE-2023-39804 LOW 1.34+dfsg-1 1.34+dfsg-1+deb11u1
util-linux CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
zlib1g CVE-2022-37434 CRITICAL 1:1.2.11.dfsg-2+deb11u1 1:1.2.11.dfsg-2+deb11u2

No Misconfigurations found

Java

435 known vulnerabilities found (CRITICAL: 68 HIGH: 201 MEDIUM: 144 LOW: 22)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2017-15095 CRITICAL 2.4.0 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-15095 CRITICAL 2.4.0 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-17485 CRITICAL 2.4.0 2.9.4, 2.8.11, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-17485 CRITICAL 2.4.0 2.9.4, 2.8.11, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-7525 CRITICAL 2.4.0 2.6.7.1, 2.7.9.1, 2.8.9
com.fasterxml.jackson.core:jackson-databind CVE-2017-7525 CRITICAL 2.4.0 2.6.7.1, 2.7.9.1, 2.8.9
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.4.0 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.4.0 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.4.0 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.4.0 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.4.0 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.4.0 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-5968 HIGH 2.4.0 2.8.11.1, 2.9.4, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-5968 HIGH 2.4.0 2.8.11.1, 2.9.4, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.4.0 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.4.0 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.4.0 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.4.0 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.4.0 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.4.0 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.4.0 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.4.0 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.4.0 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.4.0 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.4.0 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.4.0 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.4.0 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.4.0 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.4.0 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.4.0 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.4.0 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.4.0 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.4.0 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.4.0 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.9.4 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-14720 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-14721 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19360 CRITICAL 2.9.4 2.9.8, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19361 CRITICAL 2.9.4 2.7.9.5, 2.9.8, 2.8.11.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.9.4 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.9.4 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.9.4 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.9.4 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.9.4 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.9.4 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.9.4 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.9.4 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.9.4 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.9.4 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.9.4 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-9546 CRITICAL 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.9.4 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.9.4 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.9.4 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-12023 HIGH 2.9.4 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.9.4 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.9.4 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.9.4 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2019-14893 HIGH 2.9.4 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10672 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.9.4 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10968 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10969 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11111 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11112 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11113 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11619 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11620 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-14060 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-14061 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-14062 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-14195 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.9.4 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.9.4 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-25649 HIGH 2.9.4 2.6.7.4, 2.9.10.7, 2.10.5.1
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.9.4 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.9.4 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.9.4 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.9.4 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.9.4 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.9.4 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.google.guava:guava CVE-2018-10237 MEDIUM 16.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 16.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 16.0.1 32.0.0-android
com.google.guava:guava CVE-2018-10237 MEDIUM 22.0 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 22.0 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 22.0 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 22.0 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 22.0 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 22.0 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.11.3 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.11.3 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.11.3 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.11.3 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.11.3 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.11.3 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.21.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.21.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.21.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.31 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
io.airlift:aircompressor CVE-2024-36114 HIGH 0.21 0.27
io.airlift:aircompressor CVE-2024-36114 HIGH 0.21 0.27
io.grpc:grpc-protobuf CVE-2023-1428 HIGH 1.26.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32731 HIGH 1.26.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32732 MEDIUM 1.26.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-1428 HIGH 1.51.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32731 HIGH 1.51.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32732 MEDIUM 1.51.0 1.53.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty-codec-haproxy CVE-2022-41881 MEDIUM 4.1.77.Final 4.1.86.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.86.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.77.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.86.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.calcite.avatica:avatica-core CVE-2022-36364 HIGH 1.12.0 1.22.0
org.apache.calcite.avatica:avatica-core CVE-2022-36364 HIGH 1.12.0 1.22.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.druid:druid-core CVE-2021-26920 MEDIUM 0.17.1 0.21.0
org.apache.druid:druid-core CVE-2021-36749 MEDIUM 0.17.1 0.22.0
org.apache.httpcomponents:httpclient CVE-2020-13956 MEDIUM 4.5.2 4.5.13, 5.0.3
org.apache.httpcomponents:httpclient CVE-2020-13956 MEDIUM 4.5.2 4.5.13, 5.0.3
org.apache.kafka:kafka-clients CVE-2021-38153 MEDIUM 2.5.0 2.6.3, 2.7.2, 2.8.1
org.apache.solr:solr-solrj CVE-2023-50298 MEDIUM 8.8.2 9.4.1, 8.11.3
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.8.3 3.8.4, 3.9.2
org.bouncycastle:bcprov-jdk15on CVE-2023-33202 MEDIUM 1.68 1.70
org.bouncycastle:bcprov-jdk15on CVE-2024-29857 MEDIUM 1.68 1.78
org.bouncycastle:bcprov-jdk15on CVE-2024-30171 MEDIUM 1.68 1.78
org.bouncycastle:bcprov-jdk15on CVE-2024-30172 MEDIUM 1.68 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-29857 MEDIUM 1.77 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-30171 MEDIUM 1.77 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-30172 MEDIUM 1.77 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-34447 LOW 1.77 1.78
org.eclipse.jetty.http2:http2-common CVE-2024-22201 HIGH 9.4.34.v20201102 9.4.54, 10.0.20, 11.0.20
org.eclipse.jetty.http2:http2-common CVE-2023-44487 MEDIUM 9.4.34.v20201102 9.4.53, 10.0.17, 11.0.17
org.eclipse.jetty.http2:http2-hpack CVE-2023-36478 HIGH 9.4.34.v20201102 10.0.16, 11.0.16, 9.4.53
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.45.v20220203 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.45.v20220203 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.45.v20220203 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.45.v20220203 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-server CVE-2023-26048 MEDIUM 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14
org.eclipse.jetty:jetty-server CVE-2023-26048 MEDIUM 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14
org.eclipse.jetty:jetty-server CVE-2023-26049 LOW 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0
org.eclipse.jetty:jetty-server CVE-2023-26049 LOW 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.45.v20220203 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.45.v20220203 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.jetbrains.kotlin:kotlin-stdlib CVE-2020-29582 MEDIUM 1.4.10 1.4.21
org.jetbrains.kotlin:kotlin-stdlib CVE-2020-29582 MEDIUM 1.4.10 1.4.21
org.jetbrains.kotlin:kotlin-stdlib CVE-2022-24329 MEDIUM 1.4.10 1.6.0
org.jetbrains.kotlin:kotlin-stdlib CVE-2022-24329 MEDIUM 1.4.10 1.6.0
org.springframework:spring-expression CVE-2023-20863 HIGH 5.3.21 6.0.8, 5.3.27, 5.2.24.RELEASE
org.springframework:spring-expression CVE-2023-20861 MEDIUM 5.3.21 6.0.7, 5.3.26, 5.2.23.RELEASE
org.springframework:spring-expression CVE-2024-38808 MEDIUM 5.3.21 5.3.39
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.8.2 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.8.2 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.8.2 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.1.8.2 1.1.10.1
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/warehousekeeper:pr-138 (ubuntu 22.04)

441 known vulnerabilities found (CRITICAL: 0 HIGH: 19 MEDIUM: 391 LOW: 31)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
bind9-host CVE-2024-0760 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-host CVE-2024-1737 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-host CVE-2024-1975 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-host CVE-2024-4076 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-libs CVE-2024-0760 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-libs CVE-2024-1737 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-libs CVE-2024-1975 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
bind9-libs CVE-2024-4076 MEDIUM 1:9.18.24-0ubuntu0.22.04.1 1:9.18.28-0ubuntu0.22.04.1
curl CVE-2024-7264 MEDIUM 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.17
krb5-user CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
krb5-user CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libcurl4 CVE-2024-7264 MEDIUM 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.17
libgssapi-krb5-2 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libgssapi-krb5-2 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libgssrpc4 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libgssrpc4 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libk5crypto3 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libk5crypto3 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkadm5clnt-mit12 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkadm5clnt-mit12 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkadm5srv-mit12 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkadm5srv-mit12 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkdb5-10 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkdb5-10 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5-3 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5-3 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5support0 CVE-2024-37370 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libkrb5support0 CVE-2024-37371 MEDIUM 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4
libpython3.10 CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10 CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10 CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10 CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10-dev CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10-dev CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10-dev CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10-dev CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10-minimal CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10-minimal CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10-minimal CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10-minimal CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10-stdlib CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10-stdlib CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libpython3.10-stdlib CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
libpython3.10-stdlib CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
libssl3 CVE-2022-40735 MEDIUM 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.16
libssl3 CVE-2024-6119 MEDIUM 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.18
libssl3 CVE-2024-2511 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
libssl3 CVE-2024-4603 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
libssl3 CVE-2024-4741 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
libssl3 CVE-2024-5535 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
libtiff5 CVE-2024-7006 MEDIUM 4.3.0-6ubuntu0.8 4.3.0-6ubuntu0.10
libtiff5 CVE-2023-3164 LOW 4.3.0-6ubuntu0.8 4.3.0-6ubuntu0.9
linux-libc-dev CVE-2023-20569 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52447 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52620 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52880 HIGH 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2023-6270 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26583 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26584 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26585 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26642 HIGH 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26643 HIGH 5.15.0-107.117 5.15.0-113.123
linux-libc-dev CVE-2024-26809 HIGH 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26828 HIGH 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26921 HIGH 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2024-26923 HIGH 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26924 HIGH 5.15.0-107.117 5.15.0-113.123
linux-libc-dev CVE-2024-26925 HIGH 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26960 HIGH 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27398 HIGH 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36016 HIGH 5.15.0-107.117 5.15.0-117.127
linux-libc-dev CVE-2022-38096 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2022-48808 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2023-52434 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52488 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2023-52497 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52585 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2023-52629 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2023-52640 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52641 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52644 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52645 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52650 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52652 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52656 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52662 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2023-52699 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2023-52752 MEDIUM 5.15.0-107.117 5.15.0-117.127
linux-libc-dev CVE-2023-52760 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2023-52882 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2023-7042 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-21823 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-22099 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-24861 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-25739 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-25742 MEDIUM 5.15.0-107.117 5.15.0-117.127
linux-libc-dev CVE-2024-26601 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26603 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26629 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26651 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26654 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26659 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26680 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2024-26687 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26688 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26733 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26735 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26736 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26737 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26743 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26744 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26747 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26748 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26749 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26750 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26751 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26752 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26754 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26763 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26764 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26766 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26769 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26771 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26772 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26773 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26774 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26776 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26777 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26778 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26779 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26782 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26787 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26788 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26790 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26791 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26792 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26793 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26795 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26798 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26801 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26802 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26803 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26804 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26805 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26810 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26811 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26812 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26813 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26814 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26816 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26817 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26830 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2024-26833 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26835 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26838 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26839 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26840 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26843 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26845 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26848 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26851 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26852 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26855 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26856 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26857 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26859 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26861 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26862 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26863 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26870 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26874 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26875 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26877 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26878 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26880 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26881 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26882 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26883 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26884 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26885 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26886 MEDIUM 5.15.0-107.117 5.15.0-117.127
linux-libc-dev CVE-2024-26889 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26891 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26897 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26898 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26900 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-26901 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26903 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26907 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26915 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26922 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26926 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26929 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26931 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26934 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26935 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26936 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-26937 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26950 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26951 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26952 MEDIUM 5.15.0-107.117 5.15.0-117.127
linux-libc-dev CVE-2024-26955 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26956 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26957 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26958 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26961 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26964 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26965 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26966 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26969 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26970 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26974 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26976 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26977 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26980 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-26981 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26984 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26988 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26989 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26993 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26994 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26996 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26999 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27000 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27001 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27004 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27008 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27009 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27013 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27015 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27016 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27017 MEDIUM 5.15.0-107.117 5.15.0-117.127
linux-libc-dev CVE-2024-27018 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27019 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27020 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27024 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27028 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27030 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27034 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27037 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27038 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27039 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27043 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27044 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27045 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27046 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27047 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27051 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27052 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27053 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27054 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27059 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27065 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27075 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27076 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27077 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27078 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27388 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27390 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27393 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27395 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27396 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27399 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-27401 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-27403 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27405 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27410 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27412 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27413 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27414 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27415 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27416 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27417 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27419 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27431 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27432 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27436 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27437 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35785 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35789 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35791 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35796 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35804 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35805 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35806 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35807 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35809 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35813 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35815 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35817 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35819 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35821 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35822 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35823 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35825 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35828 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-35829 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-35830 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-35844 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-35845 MEDIUM 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-35847 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35848 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-35849 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35851 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35852 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35853 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35854 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35855 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35857 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35871 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35872 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35877 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35879 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35884 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35885 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35886 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35888 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35890 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35893 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35895 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35896 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35897 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35898 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35899 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35900 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35902 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35905 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35907 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35910 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35912 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35915 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35922 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35925 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35930 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35933 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35934 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35935 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35936 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35938 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35940 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35944 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35947 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-35950 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35955 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35958 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35960 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35969 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35970 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35973 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35976 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35978 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35982 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35984 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35988 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35989 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35990 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-35997 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36004 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36005 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36006 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36007 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36008 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36017 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36020 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36025 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36029 MEDIUM 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-36031 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36880 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36883 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36886 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36889 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36901 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2024-36902 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36904 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36905 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36906 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36916 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36919 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36928 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36929 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36931 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36933 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36934 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36937 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36938 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36939 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36940 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36941 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36944 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36946 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36947 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36950 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36952 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36953 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36954 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36955 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36957 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36959 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36960 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36964 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36965 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36967 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36969 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-36975 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-38600 MEDIUM 5.15.0-107.117 5.15.0-118.128
linux-libc-dev CVE-2024-39292 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2024-39484 MEDIUM 5.15.0-107.117 5.15.0-119.129
linux-libc-dev CVE-2024-0841 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-23307 LOW 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-24857 LOW 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-24858 LOW 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-24859 LOW 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-26820 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26846 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26872 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26879 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26894 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26895 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26906 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-26973 LOW 5.15.0-107.117 5.15.0-116.126
linux-libc-dev CVE-2024-27073 LOW 5.15.0-107.117 5.15.0-112.122
linux-libc-dev CVE-2024-27074 LOW 5.15.0-107.117 5.15.0-112.122
openssl CVE-2022-40735 MEDIUM 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.16
openssl CVE-2024-6119 MEDIUM 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.18
openssl CVE-2024-2511 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
openssl CVE-2024-4603 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
openssl CVE-2024-4741 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
openssl CVE-2024-5535 LOW 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17
python3.10 CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
python3.10 CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
python3.10 CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
python3.10 CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
python3.10-dev CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
python3.10-dev CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
python3.10-dev CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
python3.10-dev CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
python3.10-minimal CVE-2023-6597 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
python3.10-minimal CVE-2024-0397 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.5
python3.10-minimal CVE-2024-0450 MEDIUM 3.10.12-1~22.04.3 3.10.12-1~22.04.4
python3.10-minimal CVE-2024-4032 LOW 3.10.12-1~22.04.3 3.10.12-1~22.04.5
wget CVE-2024-38428 MEDIUM 1.21.2-2ubuntu1 1.21.2-2ubuntu1.1

No Misconfigurations found

Java

113 known vulnerabilities found (CRITICAL: 4 HIGH: 51 MEDIUM: 46 LOW: 12)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
io.airlift:aircompressor CVE-2024-36114 HIGH 0.26 0.27
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.10.3 1.1.10.4
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/coder-base:pr-138 (ubuntu 24.04)

No Vulnerabilities found

No Misconfigurations found

Java

67 known vulnerabilities found (HIGH: 31 MEDIUM: 27 LOW: 7 CRITICAL: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-45294 HIGH 6.1.2.2 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-45294 HIGH 6.1.2.2 6.3.23
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 MEDIUM 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava GHSA-crjg-w57m-rqqf MEDIUM 2.1.7 3.6.0
dnsjava:dnsjava GHSA-mmwx-rj87-vfgr MEDIUM 2.1.7 3.6.0
io.airlift:aircompressor CVE-2024-36114 HIGH 0.26 0.27
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.10.3 1.1.10.4
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

gcrane

3 known vulnerabilities found (LOW: 0 CRITICAL: 0 HIGH: 1 MEDIUM: 2)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.21.12 1.22.7, 1.23.1

No Misconfigurations found

krane

3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.21.12 1.22.7, 1.23.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Containers/tasks/net8.0/Microsoft.NET.Build.Containers.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-format/dotnet-format.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-user-jwts/8.0.8-servicing.24369.8/tools/net8.0/any/dotnet-user-jwts.deps.json

1 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
System.Formats.Asn1 CVE-2024-38095 HIGH 5.0.0 6.0.1, 8.0.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-user-secrets/8.0.8-servicing.24369.8/tools/net8.0/any/dotnet-user-secrets.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/DotnetTools/dotnet-watch/8.0.108-servicing.24369.10/tools/net8.0/any/dotnet-watch.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/FSharp/fsc.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/FSharp/fsi.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/MSBuild.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/NuGet.CommandLine.XPlat.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Roslyn/Microsoft.Build.Tasks.CodeAnalysis.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Roslyn/bincore/VBCSCompiler.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Roslyn/bincore/csc.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Roslyn/bincore/vbc.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.BlazorWebAssembly/tools/net8.0/Microsoft.NET.Sdk.BlazorWebAssembly.Tool.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.Razor/source-generators/Microsoft.NET.Sdk.Razor.SourceGenerators.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.Razor/tools/rzc.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/Sdks/Microsoft.NET.Sdk.StaticWebAssets/tools/net8.0/Microsoft.NET.Sdk.StaticWebAssets.Tool.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/datacollector.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/dotnet.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/testhost.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.108/vstest.console.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/shared/Microsoft.AspNetCore.App/8.0.8/Microsoft.AspNetCore.App.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/shared/Microsoft.NETCore.App/8.0.8/Microsoft.NETCore.App.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/local/bin/cosign

5 known vulnerabilities found (CRITICAL: 1 HIGH: 1 MEDIUM: 2 LOW: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/docker/docker CVE-2024-41110 CRITICAL v26.1.4+incompatible 23.0.15, 26.1.5, 27.1.1, 25.0.6
github.com/sigstore/sigstore-go CVE-2024-45395 LOW v0.5.1 0.6.1
stdlib CVE-2024-34156 HIGH 1.22.5 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.22.5 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.22.5 1.22.7, 1.23.1

No Misconfigurations found

usr/local/bin/crane

3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.21.12 1.22.7, 1.23.1

No Misconfigurations found

usr/local/bin/helm

3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.22.6 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.22.6 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.22.6 1.22.7, 1.23.1

No Misconfigurations found

usr/local/bin/kubectl

No Vulnerabilities found

No Misconfigurations found

usr/local/bin/mc

No Vulnerabilities found

No Misconfigurations found

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant