Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update all non-major dependencies #202

Merged
merged 1 commit into from
Nov 15, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Nov 1, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update
boto3 ==1.35.38 -> ==1.35.62 age adoption passing confidence patch
curlimages/curl 8.10.1 -> 8.11.0 age adoption passing confidence stage minor
deltalake ==0.20.2 -> ==0.21.0 age adoption passing confidence minor
docker.io/apache/kyuubi 1.9.2-spark -> 1.10.0-spark age adoption passing confidence final minor
docker.io/bitnami/kubectl (source) 1.31.1 -> 1.31.2 age adoption passing confidence final patch
docker.io/curlimages/curl 8.10.1 -> 8.11.0 age adoption passing confidence stage minor
docker.io/library/node 22.9.0 -> 22.11.0 age adoption passing confidence final minor
docker/dockerfile 1.10.0 -> 1.11.1 age adoption passing confidence syntax minor
duckdb (source, changelog) ==1.1.1 -> ==1.1.3 age adoption passing confidence patch
duckdb/duckdb 1.1.1 -> 1.1.3 age adoption passing confidence patch
duckdb_engine (changelog) ==0.13.2 -> ==0.13.5 age adoption passing confidence patch
ghcr.io/miracum/util-images/spark-delta v1.7.3 -> v1.7.4 age adoption passing confidence final patch
helm/helm 3.16.2 -> 3.16.3 age adoption passing confidence patch
polars (changelog) ==1.9.0 -> ==1.13.1 age adoption passing confidence minor
quay.io/strimzi/kafka 0.43.0-kafka-3.8.0 -> 0.44.0-kafka-3.8.0 age adoption passing confidence final minor
semantic-release 24.1.2 -> 24.2.0 age adoption passing confidence dependencies minor
starrocks ==1.0.6 -> ==1.1.0 age adoption passing confidence minor

Release Notes

boto/boto3 (boto3)

v1.35.62

Compare Source

=======

  • api-change:partnercentral-selling: [botocore] Announcing AWS Partner Central API for Selling: This service launch Introduces new APIs for co-selling opportunity management and related functions. Key features include notifications, a dynamic sandbox for testing, and streamlined validations.

v1.35.61

Compare Source

=======

  • api-change:accessanalyzer: [botocore] Expand analyzer configuration capabilities for unused access analyzers. Unused access analyzer configurations now support the ability to exclude accounts and resource tags from analysis providing more granular control over the scope of analysis.
  • api-change:cloudcontrol: [botocore] Added support for CloudFormation Hooks with Cloud Control API. The GetResourceRequestStatus API response now includes an optional HooksProgressEvent and HooksRequestToken parameter for Hooks Invocation Progress as part of resource operation with Cloud Control.
  • api-change:deadline: [botocore] Adds support for select GPU accelerated instance types when creating new service-managed fleets.
  • api-change:iam: [botocore] This release includes support for five new APIs and changes to existing APIs that give AWS Organizations customers the ability to use temporary root credentials, targeted to member accounts in the organization.
  • api-change:iotwireless: [botocore] New FuotaTask resource type to enable logging for your FUOTA tasks. A ParticipatingGatewaysforMulticast parameter to choose the list of gateways to receive the multicast downlink message and the transmission interval between them. Descriptor field which will be sent to devices during FUOTA transfer.
  • api-change:ivs: [botocore] IVS now offers customers the ability to stream multitrack video to Channels.
  • api-change:license-manager-user-subscriptions: [botocore] New and updated API operations to support License Included User-based Subscription of Microsoft Remote Desktop Services (RDS).
  • api-change:partnercentral-selling: [botocore] Announcing AWS Partner Central API for Selling: This service launch Introduces new APIs for co-selling opportunity management and related functions. Key features include notifications, a dynamic sandbox for testing, and streamlined validations.
  • api-change:quicksight: [botocore] This release adds APIs for Custom Permissions management in QuickSight, and APIs to support QuickSight Branding.
  • api-change:redshift: [botocore] Adds support for Amazon Redshift S3AccessGrants
  • api-change:s3: [botocore] This release updates the ListBuckets API Reference documentation in support of the new 10,000 general purpose bucket default quota on all AWS accounts. To increase your bucket quota from 10,000 to up to 1 million buckets, simply request a quota increase via Service Quotas.
  • api-change:sagemaker: [botocore] Add support for Neuron instance types [ trn1/trn1n/inf2 ] on SageMaker Notebook Instances Platform.
  • api-change:sts: [botocore] This release introduces the new API 'AssumeRoot', which returns short-term credentials that you can use to perform privileged tasks.

v1.35.60

Compare Source

=======

  • api-change:accessanalyzer: [botocore] This release adds support for policy validation and external access findings for resource control policies (RCP). IAM Access Analyzer helps you author functional and secure RCPs and awareness that a RCP may restrict external access. Updated service API, documentation, and paginators.
  • api-change:application-signals: [botocore] Amazon CloudWatch Application Signals now supports creating Service Level Objectives with burn rates. Users can now create or update SLOs with burn rate configurations to meet their specific business requirements.
  • api-change:b2bi: [botocore] This release adds a GenerateMapping API to allow generation of JSONata or XSLT transformer code based on input and output samples.
  • api-change:billing: [botocore] Today, AWS announces the general availability of ListBillingViews API in the AWS SDKs, to enable AWS Billing Conductor (ABC) users to create proforma Cost and Usage Reports (CUR) programmatically.
  • api-change:cloudtrail: [botocore] This release adds a new API GenerateQuery that generates a query from a natural language prompt about the event data in your event data store. This operation uses generative artificial intelligence (generative AI) to produce a ready-to-use SQL query from the prompt.
  • api-change:dynamodb: [botocore] This release includes supports the new WarmThroughput feature for DynamoDB. You can now provide an optional WarmThroughput attribute for CreateTable or UpdateTable APIs to pre-warm your table or global secondary index. You can also use DescribeTable to see the latest WarmThroughput value.
  • api-change:ec2: [botocore] This release adds the source AMI details in DescribeImages API
  • api-change:internetmonitor: [botocore] Add new query type Routing_Suggestions regarding querying interface
  • api-change:mediaconvert: [botocore] This release adds support for ARN inputs in the Kantar credentials secrets name field and the MSPR field to the manifests for PlayReady DRM protected outputs.
  • api-change:organizations: [botocore] Add support for policy operations on the Resource Control Polices.

v1.35.59

Compare Source

=======

  • api-change:codebuild: [botocore] AWS CodeBuild now supports non-containerized Linux and Windows builds on Reserved Capacity.
  • api-change:controltower: [botocore] Added ResetEnabledControl API.
  • api-change:fis: [botocore] This release adds support for generating experiment reports with the experiment report configuration
  • api-change:gamelift: [botocore] Amazon GameLift releases container fleets support for general availability. Deploy Linux-based containerized game server software for hosting on Amazon GameLift.
  • api-change:payment-cryptography: [botocore] Updated ListAliases API with KeyArn filter.
  • api-change:rds: [botocore] Updates Amazon RDS documentation for Amazon RDS Extended Support for Amazon Aurora MySQL.

v1.35.58

Compare Source

=======

  • api-change:cloudfront: [botocore] No API changes from previous release. This release migrated the model to Smithy keeping all features unchanged.
  • api-change:inspector2: [botocore] Adds support for filePath filter.
  • api-change:lambda: [botocore] Add Python 3.13 (python3.13) support to AWS Lambda
  • api-change:opensearch: [botocore] Adds Support for new AssociatePackages and DissociatePackages API in Amazon OpenSearch Service that allows association and dissociation operations to be carried out on multiple packages at the same time.
  • api-change:outposts: [botocore] This release updates StartCapacityTask to allow an active Outpost to be modified. It also adds a new API to list all running EC2 instances on the Outpost.

v1.35.57

Compare Source

=======

  • api-change:batch: [botocore] This feature allows override LaunchTemplates to be specified in an AWS Batch Compute Environment.
  • api-change:bedrock-agent-runtime: [botocore] This release adds trace functionality to Bedrock Prompt Flows
  • api-change:chime-sdk-media-pipelines: [botocore] Added support for Media Capture Pipeline and Media Concatenation Pipeline for customer managed server side encryption. Now Media Capture Pipeline can use IAM sink role to get access to KMS key and encrypt/decrypt recorded artifacts. KMS key ID can also be supplied with encryption context.
  • api-change:controlcatalog: [botocore] AWS Control Catalog GetControl public API returns additional data in output, including Implementation and Parameters
  • api-change:eks: [botocore] Adds new error code Ec2InstanceTypeDoesNotExist for Amazon EKS managed node groups
  • api-change:firehose: [botocore] Amazon Data Firehose / Features : Adds support for a new DeliveryStreamType, DatabaseAsSource. DatabaseAsSource hoses allow customers to stream CDC events from their RDS and Amazon EC2 hosted databases, running MySQL and PostgreSQL database engines, to Iceberg Table destinations.
  • api-change:lambda: [botocore] This release adds support for using AWS KMS customer managed keys to encrypt AWS Lambda .zip deployment packages.
  • api-change:pinpoint-sms-voice-v2: [botocore] Added the RequiresAuthenticationTimestamp field to the RegistrationVersionStatusHistory data type.
  • api-change:qbusiness: [botocore] Adds S3 path option to pass group member list for PutGroup API.

v1.35.56

Compare Source

=======

  • api-change:autoscaling: [botocore] Auto Scaling groups now support the ability to strictly balance instances across Availability Zones by configuring the AvailabilityZoneDistribution parameter. If balanced-only is configured for a group, launches will always be attempted in the under scaled Availability Zone even if it is unhealthy.
  • api-change:bedrock-agent: [botocore] Add prompt support for chat template configuration and agent generative AI resource. Add support for configuring an optional guardrail in Prompt and Knowledge Base nodes in Prompt Flows. Add API to validate flow definition
  • api-change:bedrock-runtime: [botocore] Add Prompt management support to Bedrock runtime APIs: Converse, ConverseStream, InvokeModel, InvokeModelWithStreamingResponse
  • api-change:cleanrooms: [botocore] This release introduces support for Custom Models in AWS Clean Rooms ML.
  • api-change:cleanroomsml: [botocore] This release introduces support for Custom Models in AWS Clean Rooms ML.
  • api-change:quicksight: [botocore] Add Client Credentials based OAuth support for Snowflake and Starburst
  • api-change:resource-explorer-2: [botocore] Add GetManagedView, ListManagedViews APIs.
  • api-change:synthetics: [botocore] Add support to toggle if a canary will automatically delete provisioned canary resources such as Lambda functions and layers when a canary is deleted. This behavior can be controlled via the new ProvisionedResourceCleanup property exposed in the CreateCanary and UpdateCanary APIs.

v1.35.55

Compare Source

=======

  • api-change:codebuild: [botocore] AWS CodeBuild now adds additional compute types for reserved capacity fleet.
  • api-change:guardduty: [botocore] GuardDuty RDS Protection expands support for Amazon Aurora PostgreSQL Limitless Databases.
  • api-change:lakeformation: [botocore] API changes for new named tag expressions feature.
  • api-change:qapps: [botocore] Introduces category apis in AmazonQApps. Web experience users use Categories to tag and filter library items.
  • api-change:s3control: [botocore] Fix ListStorageLensConfigurations and ListStorageLensGroups deserialization for Smithy SDKs.
  • api-change:verifiedpermissions: [botocore] Adding BatchGetPolicy API which supports the retrieval of multiple policies across multiple policy stores within a single request.
  • enhancement:protocol: [botocore] Added support for header enabling service migration off the AWS Query protocol.

v1.35.54

Compare Source

=======

  • api-change:bedrock-agent: [botocore] Amazon Bedrock Knowledge Bases now supports using application inference profiles to increase throughput and improve resilience.
  • api-change:docdb-elastic: [botocore] Amazon DocumentDB Elastic Clusters adds support for pending maintenance actions feature with APIs GetPendingMaintenanceAction, ListPendingMaintenanceActions and ApplyPendingMaintenanceAction
  • api-change:logs: [botocore] This release introduces an improvement in PutLogEvents
  • api-change:taxsettings: [botocore] Add support for supplemental tax registrations via these new APIs: PutSupplementalTaxRegistration, ListSupplementalTaxRegistrations, and DeleteSupplementalTaxRegistration.

v1.35.53

Compare Source

=======

  • api-change:amp: [botocore] Added support for UpdateScraper API, to enable updating collector configuration in-place
  • api-change:autoscaling: [botocore] Adds bake time for Auto Scaling group Instance Refresh
  • api-change:batch: [botocore] Add podNamespace to EksAttemptDetail and containerID to EksAttemptContainerDetail.
  • api-change:elbv2: [botocore] Add UDP support for AWS PrivateLink and dual-stack Network Load Balancers
  • api-change:glue: [botocore] Add schedule support for AWS Glue column statistics
  • api-change:sagemaker: [botocore] SageMaker HyperPod adds scale-down at instance level via BatchDeleteClusterNodes API and group level via UpdateCluster API. SageMaker Training exposes secondary job status in TrainingJobSummary from ListTrainingJobs API. SageMaker now supports G6, G6e, P5e instances for HyperPod and Training.
  • api-change:sesv2: [botocore] This release enables customers to provide the email template content in the SESv2 SendEmail and SendBulkEmail APIs instead of the name or the ARN of a stored email template.

v1.35.52

Compare Source

=======

  • api-change:appsync: [botocore] This release adds support for AppSync Event APIs.
  • api-change:connect: [botocore] Updated the public documentation for the UserIdentityInfo object to accurately reflect the character limits for the FirstName and LastName fields, which were previously listed as 1-100 characters.
  • api-change:datasync: [botocore] AWS DataSync now supports Enhanced mode tasks. This task mode supports transfer of virtually unlimited numbers of objects with enhanced metrics, more detailed logs, and higher performance than Basic mode. This mode currently supports transfers between Amazon S3 locations.
  • api-change:ec2: [botocore] This release adds two new capabilities to VPC Security Groups: Security Group VPC Associations and Shared Security Groups.
  • api-change:ecs: [botocore] This release supports service deployments and service revisions which provide a comprehensive view of your Amazon ECS service history.
  • api-change:geo-maps: [botocore] Release of Amazon Location Maps API. Maps enables you to build digital maps that showcase your locations, visualize your data, and unlock insights to drive your business
  • api-change:geo-places: [botocore] Release of Amazon Location Places API. Places enables you to quickly search, display, and filter places, businesses, and locations based on proximity, category, and name
  • api-change:geo-routes: [botocore] Release of Amazon Location Routes API. Routes enables you to plan efficient routes and streamline deliveries by leveraging real-time traffic, vehicle restrictions, and turn-by-turn directions.
  • api-change:keyspaces: [botocore] Adds support for interacting with user-defined types (UDTs) through the following new operations: Create-Type, Delete-Type, List-Types, Get-Type.
  • api-change:network-firewall: [botocore] AWS Network Firewall now supports configuring TCP idle timeout
  • api-change:opensearch: [botocore] This release introduces the new OpenSearch user interface (Dashboards), a new web-based application that can be associated with multiple data sources across OpenSearch managed clusters, serverless collections, and Amazon S3, so that users can gain a comprehensive insights in an unified interface.
  • api-change:opensearchserverless: [botocore] Neo Integration via IAM Identity Center (IdC)
  • api-change:redshift: [botocore] This release launches S3 event integrations to create and manage integrations from an Amazon S3 source into an Amazon Redshift database.
  • api-change:redshift-serverless: [botocore] Adds and updates API members for the Redshift Serverless AI-driven scaling and optimization feature using the price-performance target setting.
  • api-change:route53: [botocore] This release adds support for TLSA, SSHFP, SVCB, and HTTPS record types.
  • api-change:sagemaker: [botocore] Added support for Model Registry Staging construct. Users can define series of stages that models can progress through for model workflows and lifecycle. This simplifies tracking and managing models as they transition through development, testing, and production stages.
  • api-change:workmail: [botocore] This release adds support for Multi-Factor Authentication (MFA) and Personal Access Tokens through integration with AWS IAM Identity Center.

v1.35.51

Compare Source

=======

  • api-change:bedrock: [botocore] Update Application Inference Profile
  • api-change:bedrock-runtime: [botocore] Update Application Inference Profile
  • api-change:cleanrooms: [botocore] This release adds the option for customers to configure analytics engine when creating a collaboration, and introduces the new SPARK analytics engine type in addition to maintaining the legacy CLEAN_ROOMS_SQL engine type.
  • api-change:iotfleetwise: [botocore] Updated BatchCreateVehicle and BatchUpdateVehicle APIs: LimitExceededException has been added and the maximum number of vehicles in a batch has been set to 10 explicitly
  • api-change:logs: [botocore] Added support for new optional baseline parameter in the UpdateAnomaly API. For UpdateAnomaly requests with baseline set to True, The anomaly behavior is then treated as baseline behavior. However, more severe occurrences of this behavior will still be reported as anomalies.
  • api-change:redshift-data: [botocore] Adding a new API GetStatementResultV2 that supports CSV formatted results from ExecuteStatement and BatchExecuteStatement calls.
  • api-change:sagemaker: [botocore] Adding notebook-al2-v3 as allowed value to SageMaker NotebookInstance PlatformIdentifier attribute

v1.35.50

Compare Source

=======

  • api-change:mediapackagev2: [botocore] MediaPackage V2 Live to VOD Harvester is a MediaPackage V2 feature, which is used to export content from an origin endpoint to a S3 bucket.
  • api-change:opensearch: [botocore] Adds support for provisioning dedicated coordinator nodes. Coordinator nodes can be specified using the new NodeOptions parameter in ClusterConfig.
  • api-change:rds: [botocore] This release adds support for Enhanced Monitoring and Performance Insights when restoring Aurora Limitless Database DB clusters. It also adds support for the os-upgrade pending maintenance action.
  • api-change:storagegateway: [botocore] Documentation update: Amazon FSx File Gateway will no longer be available to new customers.

v1.35.49

Compare Source

=======

  • api-change:bedrock-agent: [botocore] Add support of new model types for Bedrock Agents, Adding inference profile support for Flows and Prompt Management, Adding new field to configure additional inference configurations for Flows and Prompt Management
  • api-change:codebuild: [botocore] AWS CodeBuild now supports automatically retrying failed builds
  • api-change:lambda: [botocore] Add TagsError field in Lambda GetFunctionResponse. The TagsError field contains details related to errors retrieving tags.
  • api-change:logs: [botocore] Adding inferred token name for dynamic tokens in Anomalies.
  • api-change:supplychain: [botocore] API doc updates, and also support showing error message on a failed instance

v1.35.48

Compare Source

=======

  • api-change:appconfig: [botocore] This release improves deployment safety by granting customers the ability to REVERT completed deployments, to the last known good state.In the StopDeployment API revert case the status of a COMPLETE deployment will be REVERTED. AppConfig only allows a revert within 72 hours of deployment completion.
  • api-change:ec2: [botocore] This release includes a new API to describe some details of the Amazon Machine Images (AMIs) that were used to launch EC2 instances, even if those AMIs are no longer available for use.
  • api-change:ecs: [botocore] This release adds support for EBS volumes attached to Amazon ECS Windows tasks running on EC2 instances.
  • api-change:nimble: [botocore] The nimble client has been removed following the deprecation of the service.
  • api-change:pcs: [botocore] Documentation update: added the default value of the Slurm configuration parameter scaleDownIdleTimeInSeconds to its description.
  • api-change:qbusiness: [botocore] Add a new field in chat response. This field can be used to support nested schemas in array fields

v1.35.47

Compare Source

=======

  • api-change:bedrock: [botocore] Doc updates for supporting converse
  • api-change:connect: [botocore] Amazon Connect Service Feature: Add support to start screen sharing for a web calling contact.
  • api-change:ec2: [botocore] Amazon EC2 X8g, C8g and M8g instances are powered by AWS Graviton4 processors. X8g provide the lowest cost per GiB of memory among Graviton4 instances. C8g provide the best price performance for compute-intensive workloads. M8g provide the best price performance in for general purpose workloads.
  • api-change:mwaa: [botocore] Introducing InvokeRestApi which allows users to invoke the Apache Airflow REST API on the webserver with the specified inputs.
  • api-change:payment-cryptography: [botocore] Add support for ECC P-256 and P-384 Keys.
  • api-change:payment-cryptography-data: [botocore] Add ECDH support on PIN operations.
  • bugfix:s3: [botocore] Fix S3 200 Error handling to address bugs introduced in payload operations.

v1.35.46

Compare Source

=======

  • api-change:bedrock-runtime: [botocore] Updating invoke regex to support imported models for converse API
  • api-change:imagebuilder: [botocore] Add macOS platform and instance placement options
  • api-change:m2: [botocore] Add AuthSecretsManagerArn optional parameter to batch job APIs, expand batch parameter limits, and introduce clientToken constraints.
  • api-change:rds: [botocore] Global clusters now expose the Endpoint attribute as one of its fields. It is a Read/Write endpoint for the global cluster which resolves to the Global Cluster writer instance.
  • api-change:repostspace: [botocore] Adds the BatchAddRole and BatchRemoveRole APIs.
  • api-change:timestream-query: [botocore] This release adds support for Query Insights, a feature that provides details of query execution, enabling users to identify areas for improvement to optimize their queries, resulting in improved query performance and lower query costs.
  • bugfix:s3: [botocore] Fixed SelectObjectContent regression from #&#8203;3284 <https://github.com/boto/botocore/issues/3284>__.

v1.35.45

Compare Source

=======

  • api-change:application-insights: [botocore] This feature enables customers to specify SNS Topic ARN. CloudWatch Application Insights (CWAI) will utilize this ARN to send problem notifications.
  • api-change:autoscaling: [botocore] Adds support for removing the PlacementGroup setting on an Auto Scaling Group through the UpdateAutoScalingGroup API.
  • api-change:bedrock-agent-runtime: [botocore] Knowledge Bases for Amazon Bedrock now supports custom prompts and model parameters in the orchestrationConfiguration of the RetrieveAndGenerate API. The modelArn field accepts Custom Models and Imported Models ARNs.
  • api-change:dms: [botocore] Added support for tagging in StartReplicationTaskAssessmentRun API and introduced IsLatestTaskAssessmentRun and ResultStatistic fields for enhanced tracking and assessment result statistics.
  • api-change:ec2: [botocore] Amazon EC2 now allows you to create network interfaces with just the EFA driver and no ENA driver by specifying the network interface type as efa-only.
  • api-change:eks: [botocore] This release adds support for Amazon Application Recovery Controller (ARC) zonal shift and zonal autoshift with EKS that enhances the resiliency of multi-AZ cluster environments
  • api-change:fms: [botocore] Update AWS WAF policy - add the option to retrofit existing web ACLs instead of creating all new web ACLs.
  • api-change:payment-cryptography-data: [botocore] Adding new API to generate authenticated scripts for EMV pin change use cases.
  • api-change:wafv2: [botocore] Add a property to WebACL to indicate whether it's been retrofitted by Firewall Manager.
  • enhancement:s3: [botocore] Handle HTTP 200 responses with error information for all supported s3 operations.

v1.35.44

Compare Source

=======

  • api-change:athena: [botocore] Removing FEDERATED from Create/List/Delete/GetDataCatalog API
  • api-change:bedrock: [botocore] Adding converse support to CMI API's
  • api-change:bedrock-runtime: [botocore] Added converse support for custom imported models
  • api-change:datazone: [botocore] Adding the following project member designations: PROJECT_CATALOG_VIEWER, PROJECT_CATALOG_CONSUMER and PROJECT_CATALOG_STEWARD in the CreateProjectMembership API and PROJECT_CATALOG_STEWARD designation in the AddPolicyGrant API.
  • api-change:ec2: [botocore] RequestSpotInstances and RequestSpotFleet feature release.

v1.35.43

Compare Source

=======

  • api-change:bedrock-agent: [botocore] Removing support for topK property in PromptModelInferenceConfiguration object, Making PromptTemplateConfiguration property as required, Limiting the maximum PromptVariant to 1
  • api-change:dataexchange: [botocore] This release adds Data Grant support, through which customers can programmatically create data grants to share with other AWS accounts and accept data grants from other AWS accounts.
  • api-change:ecs: [botocore] This is an Amazon ECS documentation only update to address tickets.
  • api-change:pinpoint-sms-voice-v2: [botocore] Added the registrations status of REQUIRES_AUTHENTICATION
  • api-change:pipes: [botocore] This release adds validation to require specifying a SecurityGroup and Subnets in the Vpc object under PipesSourceSelfManagedKafkaParameters. It also adds support for iso-e, iso-f, and other non-commercial partitions in ARN parameters.
  • api-change:quicksight: [botocore] Add StartDashboardSnapshotJobSchedule API. RestoreAnalysis now supports restoring analysis to folders.
  • api-change:rds: [botocore] Updates Amazon RDS documentation for TAZ IAM support
  • api-change:workspaces: [botocore] Updated the DomainName pattern for Active Directory

v1.35.42

Compare Source

=======

  • api-change:s3: [botocore] Add support for the new optional bucket-region and prefix query parameters in the ListBuckets API. For ListBuckets requests that express pagination, Amazon S3 will now return both the bucket names and associated AWS regions in the response.
  • bugfix:Config: [botocore] Fixed sigv4a_signing_region_set resolution when set in environment or config file.

v1.35.41

Compare Source

=======

  • api-change:amplify: [botocore] Added sourceUrlType field to StartDeployment request
  • api-change:cloudformation: [botocore] Documentation update for AWS CloudFormation API Reference.
  • api-change:codebuild: [botocore] Enable proxy for reserved capacity fleet.
  • api-change:ivs: [botocore] On a channel that you own, you can now replace an ongoing stream with a new stream by streaming up with the priority parameter appended to the stream key.
  • api-change:qbusiness: [botocore] Amazon Q Business now supports embedding the Amazon Q Business web experience on third-party websites.
  • api-change:redshift: [botocore] This release launches the CreateIntegration, DeleteIntegration, DescribeIntegrations and ModifyIntegration APIs to create and manage Amazon Redshift Zero-ETL Integrations.
  • api-change:resiliencehub: [botocore] AWS Resilience Hub now integrates with the myApplications platform, enabling customers to easily assess the resilience of applications defined in myApplications. The new Resiliency widget provides visibility into application resilience and actionable recommendations for improvement.
  • api-change:sesv2: [botocore] This release adds support for email maximum delivery seconds that allows senders to control the time within which their emails are attempted for delivery.

v1.35.40

Compare Source

=======

  • api-change:codepipeline: [botocore] AWS CodePipeline V2 type pipelines now support automatically retrying failed stages and skipping stage for failed entry conditions.
  • api-change:mailmanager: [botocore] Mail Manager support for viewing and exporting metadata of archived messages.
  • api-change:securitylake: [botocore] This release updates request validation regex for resource ARNs.
  • api-change:supplychain: [botocore] This release adds AWS Supply Chain instance management functionality. Specifically adding CreateInstance, DeleteInstance, GetInstance, ListInstances, and UpdateInstance APIs.
  • api-change:transfer: [botocore] This release enables customers using SFTP connectors to query the transfer status of their files to meet their monitoring needs as well as orchestrate post transfer actions.

v1.35.39

Compare Source

=======

  • api-change:appflow: [botocore] Doc only updates for clarification around OAuth2GrantType for Salesforce.
  • api-change:elbv2: [botocore] Add zonal_shift.config.enabled attribute. Add new AdministrativeOverride construct in the describe-target-health API response to include information about the override status applied to a target.
  • api-change:emr: [botocore] This release provides new parameter "Context" in instance fleet clusters.
  • api-change:guardduty: [botocore] Added a new field for network connection details.
  • api-change:robomaker: [botocore] Documentation update: added support notices to each API action.
curl/curl-container (curlimages/curl)

v8.11.0

Compare Source

Changed
  • bump to curl 8.11.0
duckdb/duckdb (duckdb)

v1.1.3: Bugfix Release

Compare Source

This is a bug fix release for various issues discovered after we released 1.1.2. There are no new major features, just bug fixes. Database files created by DuckDB versions all the way back to v0.9.* can be read by this version.

What's Changed

Configuration

📅 Schedule: Branch creation - "before 4am on the first day of the month" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented Nov 1, 2024

🦙 MegaLinter status: ⚠️ WARNING

Descriptor Linter Files Fixed Errors Elapsed time
✅ ACTION actionlint 6 0 0.02s
✅ DOCKERFILE hadolint 12 0 0.27s
✅ EDITORCONFIG editorconfig-checker 65 0 0.18s
✅ JSON jsonlint 6 0 0.15s
✅ JSON prettier 6 0 0.81s
✅ JSON v8r 6 0 14.88s
⚠️ MARKDOWN markdownlint 14 6 0.7s
✅ PYTHON bandit 1 0 1.08s
✅ PYTHON black 1 0 0.58s
✅ PYTHON flake8 1 0 0.41s
✅ PYTHON isort 1 0 0.3s
✅ PYTHON mypy 1 0 2.36s
✅ PYTHON ruff 1 0 0.06s
✅ REPOSITORY checkov yes no 15.3s
✅ REPOSITORY gitleaks yes no 0.11s
✅ REPOSITORY git_diff yes no 0.02s
✅ REPOSITORY kics yes no 4.14s
✅ REPOSITORY secretlint yes no 0.95s
✅ REPOSITORY syft yes no 0.48s
✅ REPOSITORY trivy yes no 16.08s
✅ REPOSITORY trivy-sbom yes no 0.26s
✅ REPOSITORY trufflehog yes no 12.65s
✅ YAML prettier 10 0 0.55s
✅ YAML v8r 10 0 8.67s
✅ YAML yamllint 10 0 0.3s

See detailed report in MegaLinter reports

You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.

MegaLinter is graciously provided by OX Security

@renovate renovate bot force-pushed the renovate/all-minor-patch branch 8 times, most recently from 9c703f5 to f371f94 Compare November 8, 2024 04:37
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 14 times, most recently from 397d902 to fa6bcec Compare November 14, 2024 22:51
@renovate renovate bot force-pushed the renovate/all-minor-patch branch from fa6bcec to 0a44eee Compare November 15, 2024 03:45
Copy link

Trivy image scan report

ghcr.io/miracum/util-images/strimzi-kafka-connect:pr-202 (redhat 9.4)

18 known vulnerabilities found (LOW: 11 CRITICAL: 0 HIGH: 1 MEDIUM: 6)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
cups-libs CVE-2024-47175 LOW 1:2.3.3op2-27.el9_4 1:2.3.3op2-31.el9_5
krb5-libs CVE-2024-3596 HIGH 1.21.1-2.el9_4 1.21.1-4.el9_5
krb5-libs CVE-2024-26462 MEDIUM 1.21.1-2.el9_4 1.21.1-3.el9
krb5-libs CVE-2024-26458 LOW 1.21.1-2.el9_4 1.21.1-3.el9
krb5-libs CVE-2024-26461 LOW 1.21.1-2.el9_4 1.21.1-3.el9
libgcrypt CVE-2024-2236 MEDIUM 1.10.0-10.el9_2 1.10.0-11.el9
openssl CVE-2024-2511 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl CVE-2024-4603 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl CVE-2024-4741 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl CVE-2024-5535 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl-libs CVE-2024-2511 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl-libs CVE-2024-4603 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl-libs CVE-2024-4741 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
openssl-libs CVE-2024-5535 LOW 1:3.0.7-28.el9_4 1:3.2.2-6.el9_5
python3 CVE-2024-6232 MEDIUM 3.9.18-3.el9_4.6 3.9.19-8.el9_5.1
python3 CVE-2024-8088 MEDIUM 3.9.18-3.el9_4.6 3.9.19-8.el9
python3-libs CVE-2024-6232 MEDIUM 3.9.18-3.el9_4.6 3.9.19-8.el9_5.1
python3-libs CVE-2024-8088 MEDIUM 3.9.18-3.el9_4.6 3.9.19-8.el9

No Misconfigurations found

Java

20 known vulnerabilities found (LOW: 0 CRITICAL: 0 HIGH: 10 MEDIUM: 10)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.12.2 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-46877 HIGH 2.12.2 2.12.6, 2.13.1
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.2 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.2 2.12.7.1, 2.13.4
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.23.4 3.25.5, 4.27.5, 4.28.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.24 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
commons-io:commons-io CVE-2024-47554 HIGH 2.11.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.11.0 2.14.0
io.netty:netty-common CVE-2024-47535 HIGH 4.1.110.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.110.Final 4.1.115
org.apache.kafka:kafka-metadata CVE-2024-27309 MEDIUM 3.5.1 3.6.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.8.3 3.8.4, 3.9.2
org.bitbucket.b_c:jose4j CVE-2023-51775 MEDIUM 0.9.3 0.9.4
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.53.v20231009 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.54.v20240208 12.0.12
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.53.v20231009 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.54.v20240208 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.jetbrains.kotlin:kotlin-stdlib CVE-2020-29582 MEDIUM 1.4.10 1.4.21
org.jetbrains.kotlin:kotlin-stdlib CVE-2022-24329 MEDIUM 1.4.10 1.6.0

No Misconfigurations found

opt/kafka-exporter/kafka_exporter

3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.23.0 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.23.0 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.23.0 1.22.7, 1.23.1

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/dsf-bpe-full:pr-202 (ubuntu 22.04)

No Vulnerabilities found

No Misconfigurations found

Java

32 known vulnerabilities found (CRITICAL: 5 HIGH: 22 MEDIUM: 4 LOW: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
ca.uhn.hapi.fhir:org.hl7.fhir.convertors CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.convertors CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.convertors CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2 CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may CVE-2024-52007 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.dstu3 CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.dstu3 CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.dstu3 CVE-2024-52007 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-52007 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.r5 CVE-2024-52007 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-45294 HIGH 5.1.0 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-51132 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-52007 HIGH 5.1.0 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.validation CVE-2023-24057 CRITICAL 5.1.0 5.6.92
ca.uhn.hapi.fhir:org.hl7.fhir.validation CVE-2023-28465 HIGH 5.1.0 5.6.106
ca.uhn.hapi.fhir:org.hl7.fhir.validation CVE-2024-51132 HIGH 5.1.0 6.4.0
com.google.guava:guava CVE-2023-2976 MEDIUM 29.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 29.0-jre 32.0.0-android
org.apache.commons:commons-text CVE-2022-42889 CRITICAL 1.7 1.10.0
org.apache.httpcomponents:httpclient CVE-2020-13956 MEDIUM 4.5.12 4.5.13, 5.0.3
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 11.0.24 12.0.12
org.springframework:spring-context CVE-2024-38820 MEDIUM 6.1.13 6.1.14

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/semantic-release:pr-202 (debian 12.8)

No Vulnerabilities found

No Misconfigurations found

Node.js

1 known vulnerabilities found (MEDIUM: 0 LOW: 0 CRITICAL: 0 HIGH: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
semantic-release CVE-2020-26226 HIGH 1.0.0 17.2.3

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/kyuubi-delta:pr-202 (ubuntu 20.04)

No Vulnerabilities found

No Misconfigurations found

Java

101 known vulnerabilities found (LOW: 11 CRITICAL: 5 HIGH: 47 MEDIUM: 38)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.17.2 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.17.2 3.4.0, 1.17.6
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-common CVE-2024-47535 HIGH 4.1.108.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.77.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.96.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.96.Final 4.1.115
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.2 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.4 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.43.v20210629 12.0.12
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.51.v20230217 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.54.v20240208 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.56.v20240826 12.0.12
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.54.v20240208 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/hive-metastore:pr-202 (debian 11.4)

114 known vulnerabilities found (CRITICAL: 8 HIGH: 53 MEDIUM: 41 LOW: 10)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
bsdutils CVE-2024-28085 HIGH 1:2.36.1-8+deb11u1 2.36.1-8+deb11u2
e2fsprogs CVE-2022-1304 HIGH 1.46.2-2 1.46.2-2+deb11u1
libblkid1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libc-bin CVE-2021-3999 HIGH 2.31-13+deb11u3 2.31-13+deb11u4
libc-bin CVE-2023-4911 HIGH 2.31-13+deb11u3 2.31-13+deb11u7
libc-bin CVE-2024-2961 HIGH 2.31-13+deb11u3 2.31-13+deb11u9
libc-bin CVE-2024-33599 HIGH 2.31-13+deb11u3 2.31-13+deb11u10
libc-bin CVE-2024-33600 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc-bin CVE-2024-33601 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc-bin CVE-2024-33602 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2021-3999 HIGH 2.31-13+deb11u3 2.31-13+deb11u4
libc6 CVE-2023-4911 HIGH 2.31-13+deb11u3 2.31-13+deb11u7
libc6 CVE-2024-2961 HIGH 2.31-13+deb11u3 2.31-13+deb11u9
libc6 CVE-2024-33599 HIGH 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2024-33600 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2024-33601 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libc6 CVE-2024-33602 MEDIUM 2.31-13+deb11u3 2.31-13+deb11u10
libcom-err2 CVE-2022-1304 HIGH 1.46.2-2 1.46.2-2+deb11u1
libext2fs2 CVE-2022-1304 HIGH 1.46.2-2 1.46.2-2+deb11u1
libgnutls30 CVE-2022-2509 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u2
libgnutls30 CVE-2023-0361 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u3
libgnutls30 CVE-2024-0553 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u5
libgnutls30 CVE-2024-0567 HIGH 3.7.1-5+deb11u1 3.7.1-5+deb11u5
libgnutls30 CVE-2023-5981 MEDIUM 3.7.1-5+deb11u1 3.7.1-5+deb11u4
libgnutls30 CVE-2024-28834 MEDIUM 3.7.1-5+deb11u1 3.7.1-5+deb11u6
libgnutls30 CVE-2024-28835 MEDIUM 3.7.1-5+deb11u1 3.7.1-5+deb11u6
libgssapi-krb5-2 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libgssapi-krb5-2 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libgssapi-krb5-2 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libgssapi-krb5-2 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libk5crypto3 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libk5crypto3 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libk5crypto3 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libk5crypto3 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libkrb5-3 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5-3 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libkrb5-3 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5-3 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libkrb5support0 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5support0 CVE-2022-42898 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u3
libkrb5support0 CVE-2024-37370 HIGH 1.18.3-6+deb11u1 1.18.3-6+deb11u5
libkrb5support0 CVE-2023-36054 MEDIUM 1.18.3-6+deb11u1 1.18.3-6+deb11u4
libmount1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libpcre2-8-0 CVE-2022-1586 CRITICAL 10.36-2 10.36-2+deb11u1
libpcre2-8-0 CVE-2022-1587 CRITICAL 10.36-2 10.36-2+deb11u1
libsepol1 CVE-2021-36084 LOW 3.1-1 3.1-1+deb11u1
libsepol1 CVE-2021-36085 LOW 3.1-1 3.1-1+deb11u1
libsepol1 CVE-2021-36086 LOW 3.1-1 3.1-1+deb11u1
libsepol1 CVE-2021-36087 LOW 3.1-1 3.1-1+deb11u1
libsmartcols1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libss2 CVE-2022-1304 HIGH 1.46.2-2 1.46.2-2+deb11u1
libssl1.1 CVE-2022-4450 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0215 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0286 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0464 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2022-2097 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2022-4304 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
libssl1.1 CVE-2023-0465 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2023-0466 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2023-2650 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
libssl1.1 CVE-2023-3446 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
libssl1.1 CVE-2023-3817 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
libssl1.1 CVE-2023-5678 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
libssl1.1 CVE-2024-0727 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
libssl1.1 CVE-2024-4741 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
libssl1.1 CVE-2024-5535 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
libssl1.1 CVE-2024-2511 LOW 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
libssl1.1 CVE-2024-9143 LOW 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
libssl1.1 DLA-3942-2 UNKNOWN 1.1.1n-0+deb11u3 1.1.1w-0+deb11u2
libsystemd0 CVE-2023-50387 HIGH 247.3-7 247.3-7+deb11u6
libsystemd0 CVE-2023-50868 HIGH 247.3-7 247.3-7+deb11u6
libsystemd0 CVE-2022-3821 MEDIUM 247.3-7 247.3-7+deb11u2
libsystemd0 CVE-2022-4415 MEDIUM 247.3-7 247.3-7+deb11u2
libsystemd0 CVE-2023-7008 MEDIUM 247.3-7 247.3-7+deb11u6
libtasn1-6 CVE-2021-46848 CRITICAL 4.16.0-2 4.16.0-2+deb11u1
libtirpc-common CVE-2021-46828 HIGH 1.3.1-1 1.3.1-1+deb11u1
libtirpc3 CVE-2021-46828 HIGH 1.3.1-1 1.3.1-1+deb11u1
libudev1 CVE-2023-50387 HIGH 247.3-7 247.3-7+deb11u6
libudev1 CVE-2023-50868 HIGH 247.3-7 247.3-7+deb11u6
libudev1 CVE-2022-3821 MEDIUM 247.3-7 247.3-7+deb11u2
libudev1 CVE-2022-4415 MEDIUM 247.3-7 247.3-7+deb11u2
libudev1 CVE-2023-7008 MEDIUM 247.3-7 247.3-7+deb11u6
libuuid1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
logsave CVE-2022-1304 HIGH 1.46.2-2 1.46.2-2+deb11u1
mount CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
ncurses-base CVE-2022-29458 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u1
ncurses-base CVE-2023-29491 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u2
ncurses-bin CVE-2022-29458 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u1
ncurses-bin CVE-2023-29491 HIGH 6.2+20201114-2 6.2+20201114-2+deb11u2
openssl CVE-2022-4450 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0215 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0286 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0464 HIGH 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2022-2097 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2022-4304 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u4
openssl CVE-2023-0465 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2023-0466 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2023-2650 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u5
openssl CVE-2023-3446 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
openssl CVE-2023-3817 MEDIUM 1.1.1n-0+deb11u3 1.1.1v-0~deb11u1
openssl CVE-2023-5678 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
openssl CVE-2024-0727 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
openssl CVE-2024-4741 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
openssl CVE-2024-5535 MEDIUM 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
openssl CVE-2024-2511 LOW 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
openssl CVE-2024-9143 LOW 1.1.1n-0+deb11u3 1.1.1n-0+deb11u6
openssl DLA-3942-2 UNKNOWN 1.1.1n-0+deb11u3 1.1.1w-0+deb11u2
perl-base CVE-2020-16156 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u4
perl-base CVE-2023-31484 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u4
perl-base CVE-2023-47038 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u3
tar CVE-2022-48303 LOW 1.34+dfsg-1 1.34+dfsg-1+deb11u1
tar CVE-2023-39804 LOW 1.34+dfsg-1 1.34+dfsg-1+deb11u1
util-linux CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
zlib1g CVE-2022-37434 CRITICAL 1:1.2.11.dfsg-2+deb11u1 1:1.2.11.dfsg-2+deb11u2

No Misconfigurations found

Java

479 known vulnerabilities found (MEDIUM: 143 LOW: 28 CRITICAL: 75 HIGH: 233)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.cedarsoftware:json-io CVE-2023-34610 HIGH 2.5.1 4.14.1
com.cedarsoftware:json-io CVE-2023-34610 HIGH 2.5.1 4.14.1
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2017-15095 CRITICAL 2.4.0 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-15095 CRITICAL 2.4.0 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-17485 CRITICAL 2.4.0 2.9.4, 2.8.11, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-17485 CRITICAL 2.4.0 2.9.4, 2.8.11, 2.7.9.2
com.fasterxml.jackson.core:jackson-databind CVE-2017-7525 CRITICAL 2.4.0 2.6.7.1, 2.7.9.1, 2.8.9
com.fasterxml.jackson.core:jackson-databind CVE-2017-7525 CRITICAL 2.4.0 2.6.7.1, 2.7.9.1, 2.8.9
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.4.0 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.4.0 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.4.0 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.4.0 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.4.0 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.4.0 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-5968 HIGH 2.4.0 2.8.11.1, 2.9.4, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-5968 HIGH 2.4.0 2.8.11.1, 2.9.4, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.4.0 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.4.0 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.4.0 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.4.0 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.4.0 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.4.0 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.4.0 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.4.0 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.4.0 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.4.0 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.4.0 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.4.0 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.4.0 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.4.0 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.4.0 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.4.0 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.4.0 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.4.0 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.4.0 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.4.0 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.4.0 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.4.0 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 CRITICAL 2.9.4 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-14720 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-14721 CRITICAL 2.9.4 2.9.7, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19360 CRITICAL 2.9.4 2.9.8, 2.8.11.3, 2.7.9.5
com.fasterxml.jackson.core:jackson-databind CVE-2018-19361 CRITICAL 2.9.4 2.7.9.5, 2.9.8, 2.8.11.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 CRITICAL 2.9.4 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 CRITICAL 2.9.4 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 CRITICAL 2.9.4 2.9.9.2, 2.8.11.4, 2.7.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 CRITICAL 2.9.4 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 CRITICAL 2.9.4 2.9.10, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 CRITICAL 2.9.4 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 CRITICAL 2.9.4 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 CRITICAL 2.9.4 2.9.10, 2.8.11.5
com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 CRITICAL 2.9.4 2.9.10.1, 2.8.11.5, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 CRITICAL 2.9.4 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2
com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 CRITICAL 2.9.4 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3
com.fasterxml.jackson.core:jackson-databind CVE-2020-9546 CRITICAL 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 CRITICAL 2.9.4 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 CRITICAL 2.9.4 2.9.10.4, 2.8.11.6, 2.7.9.7
com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 HIGH 2.9.4 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2018-12023 HIGH 2.9.4 2.7.9.4, 2.8.11.2, 2.9.6
com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 HIGH 2.9.4 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 HIGH 2.9.4 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 HIGH 2.9.4 2.6.7.3, 2.8.11.5, 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2019-14893 HIGH 2.9.4 2.9.10
com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10672 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 HIGH 2.9.4 2.9.10.4, 2.6.7.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10968 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-10969 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11111 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11112 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11113 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11619 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-11620 HIGH 2.9.4 2.9.10.4
com.fasterxml.jackson.core:jackson-databind CVE-2020-14060 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-14061 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-14062 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-14195 HIGH 2.9.4 2.9.10.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 HIGH 2.9.4 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 HIGH 2.9.4 2.6.7.5, 2.9.10.6
com.fasterxml.jackson.core:jackson-databind CVE-2020-25649 HIGH 2.9.4 2.6.7.4, 2.9.10.7, 2.10.5.1
com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 HIGH 2.9.4 2.9.10.8
com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 HIGH 2.9.4 2.9.10.8, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 HIGH 2.9.4 2.13.2.1, 2.12.6.1
com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 HIGH 2.9.4 2.9.10.7, 2.6.7.5
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.9.4 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.9.4 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 MEDIUM 2.9.4 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 MEDIUM 2.9.4 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3
com.google.guava:guava CVE-2018-10237 MEDIUM 16.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 16.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 16.0.1 32.0.0-android
com.google.guava:guava CVE-2018-10237 MEDIUM 22.0 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 22.0 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 22.0 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 22.0 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 22.0 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 22.0 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 27.0-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 28.2-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 2.5.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 2.5.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 2.5.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 2.5.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 2.5.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.11.3 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.11.3 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.11.3 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.11.3 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.11.3 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.11.3 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.11.3 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.11.3 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.11.3 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.24.4 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.24.4 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.31 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
com.squareup.okio:okio CVE-2023-3635 MEDIUM 2.8.0 3.4.0, 1.17.6
commons-io:commons-io CVE-2024-47554 HIGH 2.12.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
io.airlift:aircompressor CVE-2024-36114 HIGH 0.21 0.27
io.airlift:aircompressor CVE-2024-36114 HIGH 0.21 0.27
io.grpc:grpc-protobuf CVE-2023-1428 HIGH 1.26.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32731 HIGH 1.26.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32732 MEDIUM 1.26.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-1428 HIGH 1.51.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32731 HIGH 1.51.0 1.53.0
io.grpc:grpc-protobuf CVE-2023-32732 MEDIUM 1.51.0 1.53.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.5.Final 4.0.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20444 CRITICAL 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37136 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-37137 HIGH 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2019-20445 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21290 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21295 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-21409 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty CVE-2021-43797 MEDIUM 3.10.6.Final 4.0.0
io.netty:netty-codec-haproxy CVE-2022-41881 MEDIUM 4.1.77.Final 4.1.86.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.86.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.89.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.77.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.89.Final 4.1.100.Final
io.netty:netty-common CVE-2024-47535 HIGH 4.1.77.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.77.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.86.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.89.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.89.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.89.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.89.Final 4.1.115
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.86.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.89.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.3 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.3 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.3 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.calcite.avatica:avatica-core CVE-2022-36364 HIGH 1.12.0 1.22.0
org.apache.calcite.avatica:avatica-core CVE-2022-36364 HIGH 1.12.0 1.22.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.8.0 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.druid:druid-core CVE-2021-26920 MEDIUM 0.17.1 0.21.0
org.apache.druid:druid-core CVE-2021-36749 MEDIUM 0.17.1 0.22.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.6 3.4.0
org.apache.httpcomponents:httpclient CVE-2020-13956 MEDIUM 4.5.2 4.5.13, 5.0.3
org.apache.httpcomponents:httpclient CVE-2020-13956 MEDIUM 4.5.2 4.5.13, 5.0.3
org.apache.kafka:kafka-clients CVE-2021-38153 MEDIUM 2.5.0 2.6.3, 2.7.2, 2.8.1
org.apache.solr:solr-solrj CVE-2023-50298 MEDIUM 8.8.2 9.4.1, 8.11.3
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.8.3 3.8.4, 3.9.2
org.bouncycastle:bcprov-jdk15on CVE-2023-33202 MEDIUM 1.68 1.70
org.bouncycastle:bcprov-jdk15on CVE-2024-29857 MEDIUM 1.68 1.78
org.bouncycastle:bcprov-jdk15on CVE-2024-30171 MEDIUM 1.68 1.78
org.bouncycastle:bcprov-jdk15on CVE-2024-30172 MEDIUM 1.68 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-29857 MEDIUM 1.77 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-30171 MEDIUM 1.77 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-30172 MEDIUM 1.77 1.78
org.bouncycastle:bcprov-jdk18on CVE-2024-34447 LOW 1.77 1.78
org.eclipse.jetty.http2:http2-common CVE-2024-22201 HIGH 9.4.34.v20201102 9.4.54, 10.0.20, 11.0.20
org.eclipse.jetty.http2:http2-common CVE-2023-44487 MEDIUM 9.4.34.v20201102 9.4.53, 10.0.17, 11.0.17
org.eclipse.jetty.http2:http2-hpack CVE-2023-36478 HIGH 9.4.34.v20201102 10.0.16, 11.0.16, 9.4.53
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.45.v20220203 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.45.v20220203 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.45.v20220203 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.45.v20220203 12.0.12
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.45.v20220203 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.45.v20220203 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.51.v20230217 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.51.v20230217 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.51.v20230217 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.51.v20230217 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.51.v20230217 12.0.12
org.eclipse.jetty:jetty-server CVE-2023-26048 MEDIUM 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14
org.eclipse.jetty:jetty-server CVE-2023-26048 MEDIUM 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.45.v20220203 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.45.v20220203 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2023-26049 LOW 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0
org.eclipse.jetty:jetty-server CVE-2023-26049 LOW 9.4.45.v20220203 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.51.v20230217 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.51.v20230217 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.51.v20230217 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.51.v20230217 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.45.v20220203 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.45.v20220203 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.51.v20230217 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.jetbrains.kotlin:kotlin-stdlib CVE-2020-29582 MEDIUM 1.4.10 1.4.21
org.jetbrains.kotlin:kotlin-stdlib CVE-2020-29582 MEDIUM 1.4.10 1.4.21
org.jetbrains.kotlin:kotlin-stdlib CVE-2022-24329 MEDIUM 1.4.10 1.6.0
org.jetbrains.kotlin:kotlin-stdlib CVE-2022-24329 MEDIUM 1.4.10 1.6.0
org.springframework:spring-context CVE-2024-38820 MEDIUM 5.3.21 6.1.14
org.springframework:spring-expression CVE-2023-20863 HIGH 5.3.21 6.0.8, 5.3.27, 5.2.24.RELEASE
org.springframework:spring-expression CVE-2023-20861 MEDIUM 5.3.21 6.0.7, 5.3.26, 5.2.23.RELEASE
org.springframework:spring-expression CVE-2024-38808 MEDIUM 5.3.21 5.3.39
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34455 HIGH 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.8.2 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.8.2 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-43642 HIGH 1.1.8.2 1.1.10.4
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34453 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.1.8.2 1.1.10.1
org.xerial.snappy:snappy-java CVE-2023-34454 MEDIUM 1.1.8.2 1.1.10.1
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

/opt/hive/licenses/BSD-3-CLAUSE

No Vulnerabilities found

No Misconfigurations found

/opt/hive/licenses/MIT

No Vulnerabilities found

No Misconfigurations found

/opt/hive/licenses/BSD-2-CLAUSE

No Vulnerabilities found

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/warehousekeeper:pr-202 (ubuntu 22.04)

227 known vulnerabilities found (LOW: 2 CRITICAL: 0 HIGH: 4 MEDIUM: 221)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
linux-libc-dev CVE-2024-26800 HIGH 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-27397 HIGH 5.15.0-122.132 5.15.0-124.134
linux-libc-dev CVE-2024-38630 HIGH 5.15.0-122.132 5.15.0-124.134
linux-libc-dev CVE-2024-43882 HIGH 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2022-48666 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2023-52889 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2023-52918 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-25744 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-26607 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-26661 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-26669 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-26893 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-36484 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-38577 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-38602 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-38611 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-39472 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-40915 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41011 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41012 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41015 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41017 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41019 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41020 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41022 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41042 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41060 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41063 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41064 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41065 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41068 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41070 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41071 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41072 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41073 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41077 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41078 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41081 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41090 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41091 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41098 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42114 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42126 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42246 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42259 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42265 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42267 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42269 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42270 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42271 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42272 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42274 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42276 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42277 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42280 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42281 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42283 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42284 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42285 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42286 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42287 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42288 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42289 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42290 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42292 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42295 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42296 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42297 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42299 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42301 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42302 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42304 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42305 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42306 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42309 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42310 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42311 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42312 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42313 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-42318 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43817 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43828 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43829 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43830 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43834 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43835 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43839 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43841 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43846 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43849 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43853 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43854 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43856 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43858 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43860 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43861 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43863 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43867 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43869 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43870 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43871 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43873 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43875 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43879 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43880 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43883 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43884 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43889 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43890 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43892 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43893 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43894 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43902 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43905 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43907 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43908 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43909 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-43914 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44934 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44935 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44944 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44946 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44947 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44948 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44952 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44954 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44958 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44960 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44965 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44966 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44969 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44971 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44974 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44982 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44983 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44985 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44986 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44987 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44988 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44989 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44990 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44995 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44998 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-44999 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45003 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45006 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45007 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45008 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45009 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45011 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45016 MEDIUM 5.15.0-122.132 5.15.0-124.134
linux-libc-dev CVE-2024-45018 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45021 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45025 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45026 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-45028 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46673 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46675 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46676 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46677 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46679 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46685 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46689 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46702 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46707 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46713 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46714 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46719 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46721 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46722 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46723 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46724 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46725 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46731 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46732 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46737 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46738 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46739 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46740 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46743 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46744 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46745 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46746 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46747 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46750 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46752 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46755 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46756 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46757 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46758 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46759 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46761 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46763 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46771 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46777 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46780 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46781 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46782 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46783 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46791 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46795 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46798 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46800 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46804 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46805 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46807 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46810 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46814 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46815 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46817 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46818 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46819 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46822 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46828 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46829 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46832 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46840 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-46844 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47659 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47660 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47663 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47665 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47667 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47668 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-47669 MEDIUM 5.15.0-122.132 5.15.0-125.135
linux-libc-dev CVE-2024-41059 LOW 5.15.0-122.132 5.15.0-125.135
python3-pip CVE-2024-37891 LOW 22.0.2+dfsg-1ubuntu0.4 22.0.2+dfsg-1ubuntu0.5

No Misconfigurations found

Java

126 known vulnerabilities found (MEDIUM: 44 LOW: 14 CRITICAL: 8 HIGH: 60)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-common CVE-2024-47535 HIGH 4.1.77.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.96.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.96.Final 4.1.115
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.2 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.2 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.4 3.4.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.4 3.4.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.43.v20210629 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.43.v20210629 12.0.12
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.54.v20240208 12.0.12
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.54.v20240208 12.0.12
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.54.v20240208 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.54.v20240208 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/coder-base:pr-202 (ubuntu 24.04)

No Vulnerabilities found

No Misconfigurations found

Java

79 known vulnerabilities found (MEDIUM: 27 LOW: 8 CRITICAL: 4 HIGH: 40)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-45294 HIGH 6.1.2.2 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-51132 HIGH 6.1.2.2 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.r4 CVE-2024-52007 HIGH 6.1.2.2 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-45294 HIGH 6.1.2.2 6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-51132 HIGH 6.1.2.2 6.4.0
ca.uhn.hapi.fhir:org.hl7.fhir.utilities CVE-2024-52007 HIGH 6.1.2.2 6.4.0
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.6.1 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.6.1 2.12.7.1, 2.13.4
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 HIGH 2.12.7 2.12.7.1, 2.13.4
com.fasterxml.woodstox:woodstox-core CVE-2022-40152 MEDIUM 5.3.0 6.4.0, 5.4.0
com.google.code.gson:gson CVE-2022-25647 HIGH 2.2.4 2.8.9
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2018-10237 MEDIUM 14.0.1 24.1.1-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 14.0.1 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2023-2976 MEDIUM 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.guava:guava CVE-2020-8908 LOW 30.1.1-jre 32.0.0-android
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.3.0 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.3.0 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.google.protobuf:protobuf-java CVE-2021-22569 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2021-22570 HIGH 3.7.1 3.15.0
com.google.protobuf:protobuf-java CVE-2022-3509 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2022-3171 MEDIUM 3.7.1 3.21.7, 3.20.3, 3.19.6, 3.16.3
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 HIGH 9.8.1 9.37.2
com.squareup.okio:okio CVE-2023-3635 MEDIUM 1.15.0 3.4.0, 1.17.6
commons-io:commons-io CVE-2024-47554 HIGH 2.8.0 2.14.0
commons-net:commons-net CVE-2021-37533 MEDIUM 3.6 3.9.0
dnsjava:dnsjava CVE-2024-25638 HIGH 2.1.7 3.6.0
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.77.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http CVE-2024-29025 MEDIUM 4.1.96.Final 4.1.108.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-common CVE-2024-47535 HIGH 4.1.77.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.96.Final 4.1.115
io.netty:netty-common CVE-2024-47535 HIGH 4.1.96.Final 4.1.115
io.netty:netty-handler CVE-2023-34462 MEDIUM 4.1.77.Final 4.1.94.Final
net.minidev:json-smart CVE-2021-31684 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.11.2 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.11.2 1.11.3
org.apache.avro:avro CVE-2024-47561 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2023-39410 HIGH 1.7.7 1.11.3
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.21 1.26.0
org.apache.commons:commons-compress CVE-2024-25710 HIGH 1.23.0 1.26.0
org.apache.commons:commons-compress CVE-2023-42503 MEDIUM 1.23.0 1.24.0
org.apache.commons:commons-compress CVE-2024-26308 MEDIUM 1.23.0 1.26.0
org.apache.commons:commons-configuration2 CVE-2024-29131 MEDIUM 2.1.1 2.10.1
org.apache.commons:commons-configuration2 CVE-2024-29133 MEDIUM 2.1.1 2.10.1
org.apache.derby:derby CVE-2022-46337 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.hadoop:hadoop-common CVE-2024-23454 LOW 3.3.4 3.4.0
org.apache.ivy:ivy CVE-2022-46751 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.apache.zookeeper:zookeeper CVE-2024-23944 MEDIUM 3.6.3 3.8.4, 3.9.2
org.eclipse.jetty:jetty-http CVE-2023-40167 MEDIUM 9.4.43.v20210629 9.4.52, 10.0.16, 11.0.16, 12.0.1
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.43.v20210629 12.0.12
org.eclipse.jetty:jetty-http CVE-2022-2047 LOW 9.4.43.v20210629 9.4.47, 10.0.10, 11.0.10
org.eclipse.jetty:jetty-http CVE-2024-6763 MEDIUM 9.4.54.v20240208 12.0.12
org.eclipse.jetty:jetty-server CVE-2024-8184 MEDIUM 9.4.54.v20240208 12.0.9, 10.0.24, 11.0.24, 9.4.56
org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh LOW 9.4.43.v20210629 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823
software.amazon.ion:ion-java CVE-2024-21634 HIGH 1.0.2 1.10.5

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

gcrane

3 known vulnerabilities found (MEDIUM: 2 LOW: 0 CRITICAL: 0 HIGH: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.21.12 1.22.7, 1.23.1

No Misconfigurations found

krane

4 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/golang-jwt/jwt/v4 CVE-2024-51744 LOW v4.5.0 4.5.1
stdlib CVE-2024-34156 HIGH 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.21.12 1.22.7, 1.23.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/Containers/tasks/net8.0/Microsoft.NET.Build.Containers.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/DotnetTools/dotnet-format/dotnet-format.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/DotnetTools/dotnet-user-jwts/8.0.10-servicing.24468.4/tools/net8.0/any/dotnet-user-jwts.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/DotnetTools/dotnet-user-secrets/8.0.10-servicing.24468.4/tools/net8.0/any/dotnet-user-secrets.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/DotnetTools/dotnet-watch/8.0.110-servicing.24469.18/tools/net8.0/any/dotnet-watch.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/FSharp/fsc.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/FSharp/fsi.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/MSBuild.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/NuGet.CommandLine.XPlat.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/Sdks/Microsoft.NET.Sdk.BlazorWebAssembly/tools/net8.0/Microsoft.NET.Sdk.BlazorWebAssembly.Tool.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/Sdks/Microsoft.NET.Sdk.Razor/source-generators/Microsoft.NET.Sdk.Razor.SourceGenerators.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/Sdks/Microsoft.NET.Sdk.Razor/tools/rzc.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/Sdks/Microsoft.NET.Sdk.StaticWebAssets/tools/net8.0/Microsoft.NET.Sdk.StaticWebAssets.Tool.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/datacollector.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/dotnet.deps.json

1 known vulnerabilities found (CRITICAL: 1 HIGH: 0 MEDIUM: 0 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
NuGet.Packaging CVE-2024-0057 CRITICAL 6.8.1-rc.32767 5.11.6, 6.0.6, 6.3.4, 6.4.3, 6.6.2, 6.7.1, 6.8.1

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/testhost.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/sdk/8.0.110/vstest.console.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/shared/Microsoft.AspNetCore.App/8.0.10/Microsoft.AspNetCore.App.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/lib/dotnet/shared/Microsoft.NETCore.App/8.0.10/Microsoft.NETCore.App.deps.json

No Vulnerabilities found

No Misconfigurations found

usr/local/bin/cosign

1 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 0 LOW: 1)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
github.com/golang-jwt/jwt/v4 CVE-2024-51744 LOW v4.5.0 4.5.1

No Misconfigurations found

usr/local/bin/crane

3 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 2 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
stdlib CVE-2024-34156 HIGH 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34155 MEDIUM 1.21.12 1.22.7, 1.23.1
stdlib CVE-2024-34158 MEDIUM 1.21.12 1.22.7, 1.23.1

No Misconfigurations found

usr/local/bin/helm

No Vulnerabilities found

No Misconfigurations found

usr/local/bin/kubectl

No Vulnerabilities found

No Misconfigurations found

usr/local/bin/mc

No Vulnerabilities found

No Misconfigurations found

Copy link

Trivy image scan report

ghcr.io/miracum/util-images/apache-superset:pr-202 (debian 12.6)

606 known vulnerabilities found (CRITICAL: 3 HIGH: 144 MEDIUM: 441 LOW: 16)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
curl CVE-2024-7264 MEDIUM 7.88.1-10+deb12u6 7.88.1-10+deb12u7
curl CVE-2024-8096 MEDIUM 7.88.1-10+deb12u6 7.88.1-10+deb12u8
libcurl4 CVE-2024-7264 MEDIUM 7.88.1-10+deb12u6 7.88.1-10+deb12u7
libcurl4 CVE-2024-8096 MEDIUM 7.88.1-10+deb12u6 7.88.1-10+deb12u8
libecpg-compat3 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libecpg-dev CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libecpg6 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libexpat1 CVE-2024-45491 CRITICAL 2.5.0-1 2.5.0-1+deb12u1
libexpat1 CVE-2024-45492 CRITICAL 2.5.0-1 2.5.0-1+deb12u1
libexpat1 CVE-2024-45490 HIGH 2.5.0-1 2.5.0-1+deb12u1
libnghttp2-14 CVE-2024-28182 MEDIUM 1.52.0-1+deb12u1 1.52.0-1+deb12u2
libpgtypes3 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libpq-dev CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libpq5 CVE-2024-7348 HIGH 15.7-0+deb12u1 15.8-0+deb12u1
libsqlite3-0 CVE-2023-7104 HIGH 3.40.1-2 3.40.1-2+deb12u1
libssl-dev CVE-2024-4603 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl-dev CVE-2024-4741 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl-dev CVE-2024-5535 MEDIUM 3.0.13-1~deb12u1 3.0.15-1~deb12u1
libssl-dev CVE-2024-6119 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u2
libssl-dev CVE-2024-2511 LOW 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl-dev CVE-2024-9143 LOW 3.0.13-1~deb12u1 3.0.15-1~deb12u1
libssl3 CVE-2024-4603 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl3 CVE-2024-4741 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl3 CVE-2024-5535 MEDIUM 3.0.13-1~deb12u1 3.0.15-1~deb12u1
libssl3 CVE-2024-6119 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u2
libssl3 CVE-2024-2511 LOW 3.0.13-1~deb12u1 3.0.14-1~deb12u1
libssl3 CVE-2024-9143 LOW 3.0.13-1~deb12u1 3.0.15-1~deb12u1
linux-libc-dev CVE-2024-47685 CRITICAL 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-41019 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41039 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41040 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41046 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41049 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41057 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41058 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41059 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41070 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41071 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-41073 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41090 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41091 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41096 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-42228 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-42271 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42280 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42284 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42285 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42301 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42302 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42305 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42313 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42314 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-43839 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43842 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43858 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43873 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43882 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43883 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43900 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44934 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44940 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44967 HIGH 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44974 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44977 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44983 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44985 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44986 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44987 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44998 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44999 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45026 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46673 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46674 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46722 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46723 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46724 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46725 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46731 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46738 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46740 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46743 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46744 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46746 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46747 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46756 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46757 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46758 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46759 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46782 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46798 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46800 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46804 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46814 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46818 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46821 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46836 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46844 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46849 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46852 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46853 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46854 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46858 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46859 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46865 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46871 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47659 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47670 HIGH 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47682 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47686 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47695 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47696 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47697 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47698 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47701 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47718 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47723 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47727 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47730 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47742 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47747 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47748 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47750 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47751 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47757 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49852 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49853 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49854 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49855 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49860 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49882 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49883 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49884 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49889 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49894 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49895 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49900 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49903 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49924 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49930 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49936 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49966 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49967 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49969 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49981 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49982 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49983 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49992 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49995 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49997 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50007 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50033 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50035 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50059 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50073 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50074 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50083 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50086 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50088 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50115 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50124 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50125 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50127 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50128 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50131 HIGH 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2023-31083 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2023-52889 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2023-52917 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2023-52918 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-27017 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-27072 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-35937 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-35943 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-35963 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-35966 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-38632 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-39472 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-39497 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-40972 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-41012 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41015 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41016 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-41017 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41020 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41022 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41028 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41030 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41034 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41035 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41036 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41038 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41041 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41042 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41044 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41048 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41050 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41051 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41055 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41056 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41060 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41062 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41063 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41064 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41065 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41066 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41069 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41072 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41074 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41075 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41076 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41077 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41078 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41079 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41081 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41098 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-42114 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42232 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42236 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42237 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42238 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42240 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42244 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42245 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42246 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42247 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42250 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42253 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42258 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42259 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42265 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42267 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42268 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42269 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42270 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42272 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42273 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42274 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42276 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42277 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42281 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42283 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42286 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42287 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42288 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42289 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42290 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42291 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42292 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42295 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42296 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42297 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42299 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42304 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42306 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42307 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42309 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42310 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42311 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42312 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42316 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42318 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42320 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-42321 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43817 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43818 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43823 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43828 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43829 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43830 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43833 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43834 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43835 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-43837 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43846 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43849 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43851 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43853 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43854 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43855 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43856 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43859 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-43860 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43861 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43863 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43866 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-43867 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43869 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43870 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43871 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43875 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43877 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43879 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43880 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43884 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-43889 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43890 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43892 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-43893 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43894 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43895 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43897 MEDIUM 6.1.99-1 6.1.106-3
linux-libc-dev CVE-2024-43902 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43903 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43905 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43907 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43908 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43909 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43912 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43914 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44931 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44935 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44938 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44939 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44944 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44946 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44947 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44948 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44954 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44958 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44960 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44965 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44966 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44968 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44969 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44970 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44971 MEDIUM 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-44982 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44988 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44989 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44990 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44991 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-44995 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45000 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45002 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45003 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45006 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45007 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45008 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45009 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45010 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45011 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45016 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45018 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45019 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45021 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45022 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45025 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45028 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-45029 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46675 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46676 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46677 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46679 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46685 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46686 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46689 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46694 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46695 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-46702 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46707 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46710 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-46711 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46713 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46714 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46715 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46716 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46717 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46719 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46720 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46721 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46726 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46732 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46734 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46735 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46737 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46739 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46745 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46750 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46752 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46755 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46761 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46763 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46770 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46771 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46773 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46777 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46780 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46781 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46783 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46784 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46791 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46794 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46795 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46802 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46805 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46807 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46810 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46812 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46815 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46817 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46819 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46822 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46826 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46828 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46829 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46830 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46832 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46835 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46840 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46846 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46848 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46855 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-46857 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47660 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47663 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47665 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47667 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47668 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47669 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47671 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47672 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47673 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47674 MEDIUM 6.1.99-1 6.1.112-1
linux-libc-dev CVE-2024-47678 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47679 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47683 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47684 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47690 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47692 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47693 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47699 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47705 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47706 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47707 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47709 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47710 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47712 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47713 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47720 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47728 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47731 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47734 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47735 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47737 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47739 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47740 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47743 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47749 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-47756 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49850 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49851 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49856 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49858 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49859 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49863 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49866 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49867 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49868 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49870 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49871 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49875 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49877 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49878 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49879 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49881 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49886 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49890 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49892 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49896 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49902 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49905 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49907 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49912 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49913 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49927 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49933 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49935 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49937 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49938 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49944 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49946 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49948 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49949 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49952 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49954 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49955 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49957 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49958 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49959 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49961 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49962 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49963 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49965 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49973 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49975 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49977 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49978 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-49985 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50000 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50001 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50002 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50003 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50006 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50008 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50010 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50013 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50015 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50019 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50022 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50024 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50026 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50031 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50038 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50039 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50040 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50041 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50045 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50046 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50048 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50049 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50058 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50060 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50062 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50069 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50077 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50078 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50082 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50085 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50087 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50089 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50093 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50095 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50096 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50098 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50099 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50101 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50103 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50108 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50110 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50116 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50117 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50133 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50134 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50136 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50138 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50141 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50142 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50143 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50145 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50147 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50148 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50150 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50151 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50153 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50154 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50155 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50156 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50160 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50162 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50163 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50167 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50168 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50171 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50176 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50179 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50180 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50181 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50182 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50183 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50184 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50185 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50186 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50187 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50188 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50189 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50191 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50192 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50193 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50194 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50195 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50196 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50198 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50199 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50200 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50201 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50202 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50205 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50208 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50209 MEDIUM 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2023-45896 LOW 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-41007 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41027 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41047 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-41068 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43832 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43841 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-43876 LOW 6.1.99-1 6.1.106-1
linux-libc-dev CVE-2024-47738 LOW 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50044 LOW 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-50210 UNKNOWN 6.1.99-1 6.1.115-1
linux-libc-dev CVE-2024-8805 UNKNOWN 6.1.99-1 6.1.115-1
openssl CVE-2024-4603 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
openssl CVE-2024-4741 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u1
openssl CVE-2024-5535 MEDIUM 3.0.13-1~deb12u1 3.0.15-1~deb12u1
openssl CVE-2024-6119 MEDIUM 3.0.13-1~deb12u1 3.0.14-1~deb12u2
openssl CVE-2024-2511 LOW 3.0.13-1~deb12u1 3.0.14-1~deb12u1
openssl CVE-2024-9143 LOW 3.0.13-1~deb12u1 3.0.15-1~deb12u1

No Misconfigurations found

Node.js

No Vulnerabilities found

No Misconfigurations found

Python

19 known vulnerabilities found (MEDIUM: 12 LOW: 2 CRITICAL: 0 HIGH: 5)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
Flask-AppBuilder CVE-2024-45314 LOW 4.4.1 4.5.1
Flask-Cors CVE-2024-6221 HIGH 3.0.10 4.0.2
Flask-Cors CVE-2024-1681 MEDIUM 3.0.10 4.0.1
Jinja2 CVE-2024-34064 MEDIUM 3.1.3 3.1.4
Werkzeug CVE-2024-34069 HIGH 3.0.1 3.0.3
Werkzeug CVE-2024-49766 MEDIUM 3.0.1 3.0.6
Werkzeug CVE-2024-49767 MEDIUM 3.0.1 3.0.6
certifi CVE-2024-39689 LOW 2023.7.22 2024.07.04
cryptography GHSA-h4gh-qq45-vh27 MEDIUM 42.0.4 43.0.1
dnspython CVE-2023-29483 MEDIUM 2.1.0 2.6.1
gunicorn CVE-2024-1135 HIGH 21.2.0 22.0.0
idna CVE-2024-3651 MEDIUM 3.2 3.7
pillow CVE-2024-28219 MEDIUM 10.2.0 10.3.0
pip CVE-2023-5752 MEDIUM 23.0.1 23.3
requests CVE-2024-35195 MEDIUM 2.31.0 2.32.0
setuptools CVE-2024-6345 HIGH 65.5.1 70.0.0
sqlparse CVE-2024-4340 HIGH 0.4.4 0.5.0
urllib3 CVE-2024-37891 MEDIUM 1.26.18 1.26.19, 2.2.2
zipp CVE-2024-5569 MEDIUM 3.15.0 3.19.1

No Misconfigurations found

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant