Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Alert Test #99

Closed
github-actions bot opened this issue Jun 3, 2021 · 0 comments
Closed

Security Alert Test #99

github-actions bot opened this issue Jun 3, 2021 · 0 comments
Assignees
Labels
test specify the issue generated by test trivy vulnerability

Comments

@github-actions
Copy link

github-actions bot commented Jun 3, 2021

knqyf263/vuln-image (alpine 3.7.1) - Trivy Report - 2021-06-03T21:25:24.416449943Z

alpine
Package Vulnerability ID Severity Installed Version Fixed Version Links
curl CVE-2018-14618 CRITICAL 7.61.0-r0 7.61.1-r0 http://www.securitytracker.com/id/1041605 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2019:1880 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618 https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf https://curl.haxx.se/docs/CVE-2018-14618.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618 curl/curl#2756 https://linux.oracle.com/cve/CVE-2018-14618.html https://linux.oracle.com/errata/ELSA-2019-1880.html https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014 https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3765-1/ https://usn.ubuntu.com/3765-2/ https://usn.ubuntu.com/usn/usn-3765-1 https://usn.ubuntu.com/usn/usn-3765-2 https://www.debian.org/security/2018/dsa-4286
curl CVE-2018-16839 CRITICAL 7.61.0-r0 7.61.1-r1 http://www.securitytracker.com/id/1042012 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 https://curl.haxx.se/docs/CVE-2018-16839.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839 curl/curl@f3a24d7 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/usn/usn-3805-1 https://www.debian.org/security/2018/dsa-4331
curl CVE-2018-16840 CRITICAL 7.61.0-r0 7.61.1-r1 http://www.securitytracker.com/id/1042013 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840 https://curl.haxx.se/docs/CVE-2018-16840.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840 curl/curl@81d135d https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/usn/usn-3805-1
curl CVE-2018-16842 CRITICAL 7.61.0-r0 7.61.1-r1 http://www.securitytracker.com/id/1042014 https://access.redhat.com/errata/RHSA-2019:2181 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842 https://curl.haxx.se/docs/CVE-2018-16842.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842 curl/curl@d530e92 https://linux.oracle.com/cve/CVE-2018-16842.html https://linux.oracle.com/errata/ELSA-2019-2181.html https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/3805-2/ https://usn.ubuntu.com/usn/usn-3805-1 https://usn.ubuntu.com/usn/usn-3805-2 https://www.debian.org/security/2018/dsa-4331 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
curl CVE-2019-3822 CRITICAL 7.61.0-r0 7.61.1-r2 http://www.securityfocus.com/bid/106950 https://access.redhat.com/errata/RHSA-2019:3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822 https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf https://curl.haxx.se/docs/CVE-2019-3822.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822 https://linux.oracle.com/cve/CVE-2019-3822.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.gentoo.org/glsa/201903-03 https://security.netapp.com/advisory/ntap-20190315-0001/ https://security.netapp.com/advisory/ntap-20190719-0004/ https://support.f5.com/csp/article/K84141449 https://support.f5.com/csp/article/K84141449?utm_source=f5support&utm_medium=RSS https://usn.ubuntu.com/3882-1/ https://usn.ubuntu.com/usn/usn-3882-1 https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
curl CVE-2019-5481 CRITICAL 7.61.0-r0 7.61.1-r3 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html https://curl.haxx.se/docs/CVE-2019-5481.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481 https://linux.oracle.com/cve/CVE-2019-5481.html https://linux.oracle.com/errata/ELSA-2020-1792.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20191004-0003/ https://usn.ubuntu.com/usn/usn-4129-1 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
curl CVE-2019-5482 CRITICAL 7.61.0-r0 7.61.1-r3 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html https://curl.haxx.se/docs/CVE-2019-5482.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482 https://linux.oracle.com/cve/CVE-2019-5482.html https://linux.oracle.com/errata/ELSA-2020-5562.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20191004-0003/ https://security.netapp.com/advisory/ntap-20200416-0003/ https://usn.ubuntu.com/usn/usn-4129-1 https://usn.ubuntu.com/usn/usn-4129-2 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
curl CVE-2018-16890 HIGH 7.61.0-r0 7.61.1-r2 http://www.securityfocus.com/bid/106947 https://access.redhat.com/errata/RHSA-2019:3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890 https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf https://curl.haxx.se/docs/CVE-2018-16890.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890 https://linux.oracle.com/cve/CVE-2018-16890.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0001/ https://support.f5.com/csp/article/K03314397?utm_source=f5support&utm_medium=RSS https://usn.ubuntu.com/3882-1/ https://usn.ubuntu.com/usn/usn-3882-1 https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
curl CVE-2019-3823 HIGH 7.61.0-r0 7.61.1-r2 http://www.securityfocus.com/bid/106950 https://access.redhat.com/errata/RHSA-2019:3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf https://curl.haxx.se/docs/CVE-2019-3823.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823 https://linux.oracle.com/cve/CVE-2019-3823.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.gentoo.org/glsa/201903-03 https://security.netapp.com/advisory/ntap-20190315-0001/ https://usn.ubuntu.com/3882-1/ https://usn.ubuntu.com/usn/usn-3882-1 https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
expat CVE-2018-20843 HIGH 2.2.5-r0 2.2.7-r0 http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843 https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes libexpat/libexpat#186 libexpat/libexpat#262 libexpat/libexpat@11f8838 https://linux.oracle.com/cve/CVE-2018-20843.html https://linux.oracle.com/errata/ELSA-2020-4484.html https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/ https://seclists.org/bugtraq/2019/Jun/39 https://security.gentoo.org/glsa/201911-08 https://security.netapp.com/advisory/ntap-20190703-0001/ https://support.f5.com/csp/article/K51011533 https://usn.ubuntu.com/4040-1/ https://usn.ubuntu.com/4040-2/ https://usn.ubuntu.com/usn/usn-4040-1 https://usn.ubuntu.com/usn/usn-4040-2 https://www.debian.org/security/2019/dsa-4472 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
expat CVE-2019-15903 HIGH 2.2.5-r0 2.2.7-r1 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html http://seclists.org/fulldisclosure/2019/Dec/23 http://seclists.org/fulldisclosure/2019/Dec/26 http://seclists.org/fulldisclosure/2019/Dec/27 http://seclists.org/fulldisclosure/2019/Dec/30 https://access.redhat.com/errata/RHSA-2019:3210 https://access.redhat.com/errata/RHSA-2019:3237 https://access.redhat.com/errata/RHSA-2019:3756 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903 libexpat/libexpat@c20b758 libexpat/libexpat#317 libexpat/libexpat#342 libexpat/libexpat#318 https://linux.oracle.com/cve/CVE-2019-15903.html https://linux.oracle.com/errata/ELSA-2020-4484.html https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/ https://seclists.org/bugtraq/2019/Dec/17 https://seclists.org/bugtraq/2019/Dec/21 https://seclists.org/bugtraq/2019/Dec/23 https://seclists.org/bugtraq/2019/Nov/1 https://seclists.org/bugtraq/2019/Nov/24 https://seclists.org/bugtraq/2019/Oct/29 https://seclists.org/bugtraq/2019/Sep/30 https://seclists.org/bugtraq/2019/Sep/37 https://security.gentoo.org/glsa/201911-08 https://security.netapp.com/advisory/ntap-20190926-0004/ https://support.apple.com/kb/HT210785 https://support.apple.com/kb/HT210788 https://support.apple.com/kb/HT210789 https://support.apple.com/kb/HT210790 https://support.apple.com/kb/HT210793 https://support.apple.com/kb/HT210794 https://support.apple.com/kb/HT210795 https://usn.ubuntu.com/4132-1/ https://usn.ubuntu.com/4132-2/ https://usn.ubuntu.com/4165-1/ https://usn.ubuntu.com/4202-1/ https://usn.ubuntu.com/4335-1/ https://usn.ubuntu.com/usn/usn-4132-1 https://usn.ubuntu.com/usn/usn-4132-2 https://usn.ubuntu.com/usn/usn-4165-1 https://usn.ubuntu.com/usn/usn-4202-1 https://usn.ubuntu.com/usn/usn-4335-1 https://www.debian.org/security/2019/dsa-4530 https://www.debian.org/security/2019/dsa-4549 https://www.debian.org/security/2019/dsa-4571 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
git CVE-2018-17456 CRITICAL 2.15.2-r0 2.15.3-r0 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html http://www.securityfocus.com/bid/105523 http://www.securityfocus.com/bid/107511 http://www.securitytracker.com/id/1041811 https://access.redhat.com/errata/RHSA-2018:3408 https://access.redhat.com/errata/RHSA-2018:3505 https://access.redhat.com/errata/RHSA-2018:3541 https://access.redhat.com/errata/RHSA-2020:0316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456 git/git@1a7fd1f git/git@a124133 https://linux.oracle.com/cve/CVE-2018-17456.html https://linux.oracle.com/errata/ELSA-2020-0316.html https://marc.info/?l=git&m=153875888916397&w=2 https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/ https://seclists.org/bugtraq/2019/Mar/30 https://usn.ubuntu.com/3791-1/ https://usn.ubuntu.com/usn/usn-3791-1 https://www.debian.org/security/2018/dsa-4311 https://www.exploit-db.com/exploits/45548/ https://www.exploit-db.com/exploits/45631/ https://www.openwall.com/lists/oss-security/2018/10/06/3
git CVE-2019-1353 CRITICAL 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353 GHSA-589j-mmg9-733v https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://usn.ubuntu.com/usn/usn-4220-1
git CVE-2019-1349 HIGH 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2020:0228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349 GHSA-4qvh-qvv7-frc7 https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1349.html https://linux.oracle.com/errata/ELSA-2019-4356.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://usn.ubuntu.com/usn/usn-4220-1
git CVE-2019-1350 HIGH 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350 GHSA-44fr-r2hj-3f4x https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://security.gentoo.org/glsa/202003-42 https://usn.ubuntu.com/usn/usn-4220-1
git CVE-2019-1351 HIGH 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351 GHSA-39hj-fvvf-mq4f https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://usn.ubuntu.com/usn/usn-4220-1
git CVE-2019-1352 HIGH 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2020:0228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352 GHSA-5wph-8frv-58vj https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1352.html https://linux.oracle.com/errata/ELSA-2019-4356.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://usn.ubuntu.com/usn/usn-4220-1
git CVE-2019-1354 HIGH 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354 GHSA-xjx4-8694-q2fq https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://usn.ubuntu.com/usn/usn-4220-1
git CVE-2019-1387 HIGH 2.15.2-r0 2.15.4-r0 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2019:4356 https://access.redhat.com/errata/RHSA-2020:0002 https://access.redhat.com/errata/RHSA-2020:0124 https://access.redhat.com/errata/RHSA-2020:0228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387 GHSA-4wfr-gwrh-8mj2 https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1387.html https://linux.oracle.com/errata/ELSA-2020-0124.html https://lists.debian.org/debian-lts-announce/2020/01/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6UGTEOXWIYSM5KDZL74QD2GK6YQNQCP/ https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://security.gentoo.org/glsa/202003-42 https://usn.ubuntu.com/usn/usn-4220-1
libbz2 CVE-2019-12900 CRITICAL 1.0.6-r6 1.0.6-r7 http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900 https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html https://seclists.org/bugtraq/2019/Aug/4 https://seclists.org/bugtraq/2019/Jul/22 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS https://usn.ubuntu.com/4038-1/ https://usn.ubuntu.com/4038-2/ https://usn.ubuntu.com/4146-1/ https://usn.ubuntu.com/4146-2/ https://usn.ubuntu.com/usn/usn-4038-1 https://usn.ubuntu.com/usn/usn-4038-2 https://usn.ubuntu.com/usn/usn-4038-3 https://usn.ubuntu.com/usn/usn-4038-4 https://usn.ubuntu.com/usn/usn-4146-1 https://usn.ubuntu.com/usn/usn-4146-2 https://www.oracle.com/security-alerts/cpuoct2020.html
libcurl CVE-2018-16839 CRITICAL 7.61.1-r0 7.61.1-r1 http://www.securitytracker.com/id/1042012 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839 https://curl.haxx.se/docs/CVE-2018-16839.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839 curl/curl@f3a24d7 https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/usn/usn-3805-1 https://www.debian.org/security/2018/dsa-4331
libcurl CVE-2018-16840 CRITICAL 7.61.1-r0 7.61.1-r1 http://www.securitytracker.com/id/1042013 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840 https://curl.haxx.se/docs/CVE-2018-16840.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840 curl/curl@81d135d https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/usn/usn-3805-1
libcurl CVE-2018-16842 CRITICAL 7.61.1-r0 7.61.1-r1 http://www.securitytracker.com/id/1042014 https://access.redhat.com/errata/RHSA-2019:2181 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842 https://curl.haxx.se/docs/CVE-2018-16842.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842 curl/curl@d530e92 https://linux.oracle.com/cve/CVE-2018-16842.html https://linux.oracle.com/errata/ELSA-2019-2181.html https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201903-03 https://usn.ubuntu.com/3805-1/ https://usn.ubuntu.com/3805-2/ https://usn.ubuntu.com/usn/usn-3805-1 https://usn.ubuntu.com/usn/usn-3805-2 https://www.debian.org/security/2018/dsa-4331 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
libcurl CVE-2019-3822 CRITICAL 7.61.1-r0 7.61.1-r2 http://www.securityfocus.com/bid/106950 https://access.redhat.com/errata/RHSA-2019:3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822 https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf https://curl.haxx.se/docs/CVE-2019-3822.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822 https://linux.oracle.com/cve/CVE-2019-3822.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.gentoo.org/glsa/201903-03 https://security.netapp.com/advisory/ntap-20190315-0001/ https://security.netapp.com/advisory/ntap-20190719-0004/ https://support.f5.com/csp/article/K84141449 https://support.f5.com/csp/article/K84141449?utm_source=f5support&utm_medium=RSS https://usn.ubuntu.com/3882-1/ https://usn.ubuntu.com/usn/usn-3882-1 https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libcurl CVE-2019-5481 CRITICAL 7.61.1-r0 7.61.1-r3 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html https://curl.haxx.se/docs/CVE-2019-5481.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481 https://linux.oracle.com/cve/CVE-2019-5481.html https://linux.oracle.com/errata/ELSA-2020-1792.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20191004-0003/ https://usn.ubuntu.com/usn/usn-4129-1 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
libcurl CVE-2019-5482 CRITICAL 7.61.1-r0 7.61.1-r3 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html https://curl.haxx.se/docs/CVE-2019-5482.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482 https://linux.oracle.com/cve/CVE-2019-5482.html https://linux.oracle.com/errata/ELSA-2020-5562.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20191004-0003/ https://security.netapp.com/advisory/ntap-20200416-0003/ https://usn.ubuntu.com/usn/usn-4129-1 https://usn.ubuntu.com/usn/usn-4129-2 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
libcurl CVE-2018-16890 HIGH 7.61.1-r0 7.61.1-r2 http://www.securityfocus.com/bid/106947 https://access.redhat.com/errata/RHSA-2019:3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890 https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf https://curl.haxx.se/docs/CVE-2018-16890.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890 https://linux.oracle.com/cve/CVE-2018-16890.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0001/ https://support.f5.com/csp/article/K03314397?utm_source=f5support&utm_medium=RSS https://usn.ubuntu.com/3882-1/ https://usn.ubuntu.com/usn/usn-3882-1 https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libcurl CVE-2019-3823 HIGH 7.61.1-r0 7.61.1-r2 http://www.securityfocus.com/bid/106950 https://access.redhat.com/errata/RHSA-2019:3701 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823 https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf https://curl.haxx.se/docs/CVE-2019-3823.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823 https://linux.oracle.com/cve/CVE-2019-3823.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E https://security.gentoo.org/glsa/201903-03 https://security.netapp.com/advisory/ntap-20190315-0001/ https://usn.ubuntu.com/3882-1/ https://usn.ubuntu.com/usn/usn-3882-1 https://www.debian.org/security/2019/dsa-4386 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
libxml2 CVE-2018-14404 HIGH 2.9.7-r0 2.9.8-r1 https://access.redhat.com/errata/RHSA-2019:1543 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 https://bugzilla.redhat.com/show_bug.cgi?id=1595985 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404 GHSA-6qvp-r6r3-9p7h sparklemotion/nokogiri#1785 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594 https://gitlab.gnome.org/GNOME/libxml2/issues/10 https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ https://linux.oracle.com/cve/CVE-2018-14404.html https://linux.oracle.com/errata/ELSA-2020-1827.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2018-14404 https://security.netapp.com/advisory/ntap-20190719-0002/ https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/ https://usn.ubuntu.com/usn/usn-3739-1 https://usn.ubuntu.com/usn/usn-3739-2
musl CVE-2019-14697 CRITICAL 1.1.18-r3 1.1.18-r4 http://www.openwall.com/lists/oss-security/2019/08/06/4 https://security.gentoo.org/glsa/202003-13 https://www.openwall.com/lists/musl/2019/08/06/1
musl-utils CVE-2019-14697 CRITICAL 1.1.18-r3 1.1.18-r4 http://www.openwall.com/lists/oss-security/2019/08/06/4 https://security.gentoo.org/glsa/202003-13 https://www.openwall.com/lists/musl/2019/08/06/1
patch CVE-2018-1000156 HIGH 2.7.5-r2 2.7.6-r0 http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html http://rachelbythebay.com/w/2018/04/05/bangpatch/ https://access.redhat.com/errata/RHSA-2018:1199 https://access.redhat.com/errata/RHSA-2018:1200 https://access.redhat.com/errata/RHSA-2018:2091 https://access.redhat.com/errata/RHSA-2018:2092 https://access.redhat.com/errata/RHSA-2018:2093 https://access.redhat.com/errata/RHSA-2018:2094 https://access.redhat.com/errata/RHSA-2018:2095 https://access.redhat.com/errata/RHSA-2018:2096 https://access.redhat.com/errata/RHSA-2018:2097 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156 https://linux.oracle.com/cve/CVE-2018-1000156.html https://linux.oracle.com/errata/ELSA-2018-1200.html https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html https://rachelbythebay.com/w/2018/04/05/bangpatch/ https://savannah.gnu.org/bugs/index.php?53566 https://seclists.org/bugtraq/2019/Aug/29 https://seclists.org/bugtraq/2019/Jul/54 https://security.gentoo.org/glsa/201904-17 https://twitter.com/kurtseifried/status/982028968877436928 https://usn.ubuntu.com/3624-1/ https://usn.ubuntu.com/3624-2/ https://usn.ubuntu.com/usn/usn-3624-1 https://usn.ubuntu.com/usn/usn-3624-2
patch CVE-2018-6952 HIGH 2.7.5-r2 2.7.6-r0 http://www.securityfocus.com/bid/103047 https://access.redhat.com/errata/RHSA-2019:2033 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952 https://linux.oracle.com/cve/CVE-2018-6952.html https://linux.oracle.com/errata/ELSA-2019-2033.html https://savannah.gnu.org/bugs/index.php?53133 https://security.gentoo.org/glsa/201904-17
patch CVE-2019-13638 HIGH 2.7.5-r2 2.7.6-r0 http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html https://access.redhat.com/errata/RHSA-2019:2798 https://access.redhat.com/errata/RHSA-2019:2964 https://access.redhat.com/errata/RHSA-2019:3757 https://access.redhat.com/errata/RHSA-2019:3758 https://access.redhat.com/errata/RHSA-2019:4061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638 https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 https://github.com/irsl/gnu-patch-vulnerabilities https://linux.oracle.com/cve/CVE-2019-13638.html https://linux.oracle.com/errata/ELSA-2019-2964.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/ https://seclists.org/bugtraq/2019/Aug/29 https://seclists.org/bugtraq/2019/Jul/54 https://security-tracker.debian.org/tracker/CVE-2019-13638 https://security.gentoo.org/glsa/201908-22 https://security.netapp.com/advisory/ntap-20190828-0001/ https://usn.ubuntu.com/usn/usn-4071-1 https://usn.ubuntu.com/usn/usn-4071-2 https://www.debian.org/security/2019/dsa-4489
sqlite-libs CVE-2019-8457 CRITICAL 3.21.0-r1 3.25.3-r1 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457 https://linux.oracle.com/cve/CVE-2019-8457.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/ https://security.netapp.com/advisory/ntap-20190606-0002/ https://usn.ubuntu.com/4004-1/ https://usn.ubuntu.com/4004-2/ https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/ https://usn.ubuntu.com/usn/usn-4004-1 https://usn.ubuntu.com/usn/usn-4004-2 https://usn.ubuntu.com/usn/usn-4019-1 https://usn.ubuntu.com/usn/usn-4019-2 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.sqlite.org/releaselog/3_28_0.html https://www.sqlite.org/src/info/90acdbfce9c08858
sqlite-libs CVE-2018-20346 HIGH 3.21.0-r1 3.25.3-r0 http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html http://www.securityfocus.com/bid/106323 https://access.redhat.com/articles/3758321 https://blade.tencent.com/magellan/index_en.html https://bugzilla.redhat.com/show_bug.cgi?id=1659379 https://bugzilla.redhat.com/show_bug.cgi?id=1659677 https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e https://crbug.com/900910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346 https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/ https://news.ycombinator.com/item?id=18685296 https://security.gentoo.org/glsa/201904-21 https://sqlite.org/src/info/940f2adc8541a838 https://sqlite.org/src/info/d44318f59044162e https://support.apple.com/HT209443 https://support.apple.com/HT209446 https://support.apple.com/HT209447 https://support.apple.com/HT209448 https://support.apple.com/HT209450 https://support.apple.com/HT209451 https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/ https://usn.ubuntu.com/usn/usn-4019-1 https://usn.ubuntu.com/usn/usn-4019-2 https://worthdoingbadly.com/sqlitebug/ https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.sqlite.org/releaselog/3_25_3.html https://www.synology.com/security/advisory/Synology_SA_18_61
subversion CVE-2019-0203 HIGH 1.9.7-r0 1.9.12-r0 http://subversion.apache.org/security/CVE-2019-0203-advisory.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203 https://linux.oracle.com/cve/CVE-2019-0203.html https://linux.oracle.com/errata/ELSA-2019-2512.html https://subversion.apache.org/security/CVE-2019-0203-advisory.txt https://usn.ubuntu.com/usn/usn-4082-1 https://usn.ubuntu.com/usn/usn-4082-2
subversion-libs CVE-2019-0203 HIGH 1.9.7-r0 1.9.12-r0 http://subversion.apache.org/security/CVE-2019-0203-advisory.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203 https://linux.oracle.com/cve/CVE-2019-0203.html https://linux.oracle.com/errata/ELSA-2019-2512.html https://subversion.apache.org/security/CVE-2019-0203-advisory.txt https://usn.ubuntu.com/usn/usn-4082-1 https://usn.ubuntu.com/usn/usn-4082-2
npm
Package Vulnerability ID Severity Installed Version Fixed Version Links
lodash CVE-2019-10744 CRITICAL 4.17.4 4.17.12 https://access.redhat.com/errata/RHSA-2019:3024 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10744 GHSA-jf85-cpcp-j695 https://nvd.nist.gov/vuln/detail/CVE-2019-10744 https://security.netapp.com/advisory/ntap-20191004-0005/ https://snyk.io/vuln/SNYK-JS-LODASH-450202 https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2020.html
lodash CVE-2018-16487 HIGH 4.17.4 4.17.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16487 GHSA-4xc9-xhrj-v574 https://hackerone.com/reports/380873 https://nvd.nist.gov/vuln/detail/CVE-2018-16487 https://security.netapp.com/advisory/ntap-20190919-0004/
lodash CVE-2020-8203 HIGH 4.17.4 4.17.19 GHSA-p6mc-m468-83gw https://github.com/lodash/lodash/issues/4874 https://hackerone.com/reports/712065 https://nvd.nist.gov/vuln/detail/CVE-2020-8203 https://security.netapp.com/advisory/ntap-20200724-0006/ https://www.npmjs.com/advisories/1523
lodash CVE-2021-23337 HIGH 4.17.4 4.17.21 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337 GHSA-35jh-r3h4-6jhm https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851 https://nvd.nist.gov/vuln/detail/CVE-2021-23337 https://security.netapp.com/advisory/ntap-20210312-0006/ https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929 https://snyk.io/vuln/SNYK-JS-LODASH-1040724
composer
Package Vulnerability ID Severity Installed Version Fixed Version Links
guzzlehttp/guzzle CVE-2016-5385 HIGH 6.2.0 4.2.4, 5.3.1, 6.2.1 http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://php.net/ChangeLog-7.php#7.0.9 http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.securityfocus.com/bid/91821 http://www.securitytracker.com/id/1036335 https://bugzilla.redhat.com/show_bug.cgi?id=1353794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 https://github.com/guzzle/guzzle/releases/tag/6.2.1 https://github.com/humbug/file_get_contents/releases/tag/1.1.2 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://httpoxy.org/ https://linux.oracle.com/cve/CVE-2016-5385.html https://linux.oracle.com/errata/ELSA-2016-1613.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/ https://security.gentoo.org/glsa/201611-22 https://usn.ubuntu.com/usn/usn-3045-1 https://www.drupal.org/SA-CORE-2016-003
pipenv
Package Vulnerability ID Severity Installed Version Fixed Version Links
django CVE-2019-19844 CRITICAL 2.0.9 3.0.1, 2.2.9, 1.11.27 http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19844 https://docs.djangoproject.com/en/dev/releases/security/ GHSA-vfq6-hq5r-27r6 https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/ https://nvd.nist.gov/vuln/detail/CVE-2019-19844 https://seclists.org/bugtraq/2020/Jan/9 https://security.gentoo.org/glsa/202004-17 https://security.netapp.com/advisory/ntap-20200110-0003/ https://usn.ubuntu.com/4224-1/ https://usn.ubuntu.com/usn/usn-4224-1 https://www.debian.org/security/2020/dsa-4598 https://www.djangoproject.com/weblog/2019/dec/18/security-releases/
django CVE-2020-7471 CRITICAL 2.0.9 3.0.3, 2.2.10, 1.11.28 http://www.openwall.com/lists/oss-security/2020/02/03/1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7471 https://docs.djangoproject.com/en/3.0/releases/security/ GHSA-hmr4-m2h5-33qx django/django@eb31d84 https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/ https://nvd.nist.gov/vuln/detail/CVE-2020-7471 https://seclists.org/bugtraq/2020/Feb/30 https://security.gentoo.org/glsa/202004-17 https://security.netapp.com/advisory/ntap-20200221-0006/ https://usn.ubuntu.com/4264-1/ https://usn.ubuntu.com/usn/usn-4264-1 https://www.debian.org/security/2020/dsa-4629 https://www.djangoproject.com/weblog/2020/feb/03/security-releases/ https://www.openwall.com/lists/oss-security/2020/02/03/1
django CVE-2019-6975 HIGH 2.0.9 2.1.6, 2.0.11, 1.11.19 http://www.securityfocus.com/bid/106964 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6975 https://docs.djangoproject.com/en/dev/releases/security/ GHSA-wh4h-v3f2-r2pp https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/ https://nvd.nist.gov/vuln/detail/CVE-2019-6975 https://seclists.org/bugtraq/2019/Jul/10 https://usn.ubuntu.com/3890-1/ https://usn.ubuntu.com/usn/usn-3890-1 https://www.debian.org/security/2019/dsa-4476 https://www.djangoproject.com/weblog/2019/feb/11/security-releases/ https://www.openwall.com/lists/oss-security/2019/02/11/1
django CVE-2020-9402 HIGH 2.0.9 3.0.4, 2.2.11, 1.11.29 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402 https://docs.djangoproject.com/en/3.0/releases/security/ GHSA-3gh2-xw74-jmcw https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/ https://nvd.nist.gov/vuln/detail/CVE-2020-9402 https://security.gentoo.org/glsa/202004-17 https://security.netapp.com/advisory/ntap-20200327-0004/ https://usn.ubuntu.com/4296-1/ https://usn.ubuntu.com/usn/usn-4296-1 https://www.debian.org/security/2020/dsa-4705 https://www.djangoproject.com/weblog/2020/mar/04/security-releases/
httplib2 CVE-2021-21240 HIGH 0.12.1 0.19.0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240 GHSA-93xj-8mrv-444m httplib2/httplib2@bd9ee25 httplib2/httplib2#182 GHSA-93xj-8mrv-444m https://nvd.nist.gov/vuln/detail/CVE-2021-21240 https://pypi.org/project/httplib2
py CVE-2020-29651 HIGH 1.8.0 1.10.0 GHSA-hj5v-574p-mj7c pytest-dev/py#256 pytest-dev/py#257 pytest-dev/py@4a9017d https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/ https://nvd.nist.gov/vuln/detail/CVE-2020-29651
pygments CVE-2021-20270 HIGH 2.3.1 2.7.4 https://bugzilla.redhat.com/show_bug.cgi?id=1922136 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20270 GHSA-9w8r-397f-prfh https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html https://nvd.nist.gov/vuln/detail/CVE-2021-20270 https://usn.ubuntu.com/usn/usn-4885-1 https://www.debian.org/security/2021/dsa-4889
pygments CVE-2021-27291 HIGH 2.3.1 2.7.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27291 https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce GHSA-pq64-v7f5-gqh8 pygments/pygments@2e7e8c4 https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-27291 https://usn.ubuntu.com/usn/usn-4897-1 https://www.debian.org/security/2021/dsa-4878 https://www.debian.org/security/2021/dsa-4889
pyyaml CVE-2019-20477 CRITICAL 5.1 5.2 GHSA-3pqx-4fqf-j49f https://github.com/yaml/pyyaml/blob/master/CHANGES https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/ https://nvd.nist.gov/vuln/detail/CVE-2019-20477 https://www.exploit-db.com/download/47655
pyyaml CVE-2020-14343 CRITICAL 5.1 5.4 https://bugzilla.redhat.com/show_bug.cgi?id=1860466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343 GHSA-8q59-q68h-6hv4 https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation https://nvd.nist.gov/vuln/detail/CVE-2020-14343 https://usn.ubuntu.com/usn/usn-4940-1
pyyaml CVE-2020-1747 CRITICAL 5.1 5.3.1 http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747 GHSA-6757-jp84-gxfx yaml/pyyaml#386 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/ https://nvd.nist.gov/vuln/detail/CVE-2020-1747
urllib3 CVE-2019-11324 HIGH 1.24.1 1.24.2 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html http://www.openwall.com/lists/oss-security/2019/04/19/1 https://access.redhat.com/errata/RHSA-2019:3335 https://access.redhat.com/errata/RHSA-2019:3590 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324 GHSA-mh33-7rrq-662w urllib3/urllib3@a6ec68a...1efadf4 https://linux.oracle.com/cve/CVE-2019-11324.html https://linux.oracle.com/errata/ELSA-2020-2068.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/ https://nvd.nist.gov/vuln/detail/CVE-2019-11324 https://usn.ubuntu.com/3990-1/ https://usn.ubuntu.com/usn/usn-3990-1 https://www.openwall.com/lists/oss-security/2019/04/17/3
bundler
Package Vulnerability ID Severity Installed Version Fixed Version Links
actionpack CVE-2020-8164 HIGH 5.2.3 6.0.3.1, 5.2.4.3 http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164 GHSA-8727-m6gj-mc37 https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY https://hackerone.com/reports/292797 https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-8164 https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released https://www.debian.org/security/2020/dsa-4766
actionpack CVE-2021-22885 HIGH 5.2.3 5.2.4.6, 5.2.6, 6.1.3.2, 6.0.3.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885 GHSA-hjg4-8q5f-x6fm https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI https://hackerone.com/reports/1106652 https://nvd.nist.gov/vuln/detail/CVE-2021-22885
activestorage CVE-2020-8162 HIGH 5.2.3 6.0.3.1, 5.2.4.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8162 GHSA-m42x-37p3-fv5w https://groups.google.com/forum/#!msg/rubyonrails-security/PjU3946mreQ/Dn-6uLbAAQAJ https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ https://hackerone.com/reports/789579 https://nvd.nist.gov/vuln/detail/CVE-2020-8162 https://www.debian.org/security/2020/dsa-4766
activesupport CVE-2020-8165 CRITICAL 5.2.3 6.0.3.1, 5.2.4.3 http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165 GHSA-2p68-f74v-9wc6 https://groups.google.com/forum/#!msg/rubyonrails-security/bv6fW4S0Y1c/KnkEqM7AAQAJ https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c https://hackerone.com/reports/413388 https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-8165 https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/ https://www.debian.org/security/2020/dsa-4766
json CVE-2020-10663 HIGH 2.2.0 2.3.0 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html http://seclists.org/fulldisclosure/2020/Dec/32 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663 GHSA-jphg-qwrw-7w9g https://groups.google.com/forum/#!topic/ruby-security-ann/ermX1eQqqKA https://hackerone.com/reports/706934 https://linux.oracle.com/cve/CVE-2020-10663.html https://linux.oracle.com/errata/ELSA-2020-5724.html https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/ https://nvd.nist.gov/vuln/detail/CVE-2020-10663 https://security.netapp.com/advisory/ntap-20210129-0003/ https://support.apple.com/kb/HT211931 https://usn.ubuntu.com/usn/usn-4882-1 https://www.debian.org/security/2020/dsa-4721 https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663 https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/
nokogiri CVE-2019-5477 CRITICAL 1.10.3 1.10.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477 GHSA-cr5j-953j-xw5p sparklemotion/nokogiri#1915 https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc#107--2019-08-06 sparklemotion/rexical@a652474 https://groups.google.com/forum/#!msg/ruby-security-ann/YMnKFsASOAE/Fw3ocLI0BQAJ https://hackerone.com/reports/650835 https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html https://nvd.nist.gov/vuln/detail/CVE-2019-5477 https://security.gentoo.org/glsa/202006-05 https://usn.ubuntu.com/4175-1/ https://usn.ubuntu.com/usn/usn-4175-1
nokogiri CVE-2019-13117 HIGH 1.10.3 >= 1.10.5 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html http://www.openwall.com/lists/oss-security/2019/11/17/2 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117 sparklemotion/nokogiri#1943 https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285 https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1 https://groups.google.com/d/msg/ruby-security-ann/-Wq4aouIA3Q/yc76ZHemBgAJ https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/ https://oss-fuzz.com/testcase-detail/5631739747106816 https://security.netapp.com/advisory/ntap-20190806-0004/ https://security.netapp.com/advisory/ntap-20200122-0003/ https://usn.ubuntu.com/4164-1/ https://usn.ubuntu.com/usn/usn-4164-1 https://www.oracle.com/security-alerts/cpujan2020.html
nokogiri CVE-2020-7595 HIGH 1.10.3 1.10.8 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595 GHSA-7553-jr98-vx47 sparklemotion/nokogiri#1992 https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076 https://linux.oracle.com/cve/CVE-2020-7595.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://nvd.nist.gov/vuln/detail/CVE-2020-7595 https://security.gentoo.org/glsa/202010-04 https://security.netapp.com/advisory/ntap-20200702-0005/ https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08 https://usn.ubuntu.com/4274-1/ https://usn.ubuntu.com/usn/usn-4274-1 https://www.oracle.com/security-alerts/cpujul2020.html
nokogiri GHSA-7rrm-v45f-jp64 HIGH 1.10.3 1.11.4 GHSA-7rrm-v45f-jp64 GHSA-7rrm-v45f-jp64
rack CVE-2020-8161 HIGH 2.0.7 2.1.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8161 GHSA-5f9h-9pjv-v6j7 rack/rack@dddb7ad https://groups.google.com/forum/#!msg/rubyonrails-security/IOO1vNZTzPA/Ylzi1UYLAAAJ https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA https://hackerone.com/reports/434404 https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html https://nvd.nist.gov/vuln/detail/CVE-2020-8161 https://usn.ubuntu.com/4561-1/ https://usn.ubuntu.com/usn/usn-4561-1 https://usn.ubuntu.com/usn/usn-4561-2
rack CVE-2020-8184 HIGH 2.0.7 2.2.3, 2.1.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184 GHSA-j6w9-fv6q-3q52 https://groups.google.com/forum/#!msg/rubyonrails-security/OWtmozPH9Ak/4m00yHPCBAAJ https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak https://hackerone.com/reports/895727 https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html https://nvd.nist.gov/vuln/detail/CVE-2020-8184 https://usn.ubuntu.com/4561-1/ https://usn.ubuntu.com/usn/usn-4561-1 https://usn.ubuntu.com/usn/usn-4561-2
rake CVE-2020-8130 HIGH 12.3.2 12.3.3 http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8130 GHSA-jppv-gw3r-w3q8 https://hackerone.com/reports/651518 https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/ https://nvd.nist.gov/vuln/detail/CVE-2020-8130 https://usn.ubuntu.com/4295-1/ https://usn.ubuntu.com/usn/usn-4295-1
websocket-extensions CVE-2020-7663 HIGH 0.1.3 0.1.5 https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663 GHSA-g6wq-qcwm-j5g2 faye/websocket-extensions-ruby@aa156a4 GHSA-g6wq-qcwm-j5g2 https://lists.debian.org/debian-lts-announce/2020/08/msg00031.html https://nvd.nist.gov/vuln/detail/CVE-2020-7663 https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830 https://usn.ubuntu.com/4502-1/ https://usn.ubuntu.com/usn/usn-4502-1
cargo
No Vulnerabilities found
@github-actions github-actions bot added test specify the issue generated by test trivy vulnerability labels Jun 3, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
test specify the issue generated by test trivy vulnerability
Projects
None yet
Development

No branches or pull requests

1 participant