abcpdf_test_app_container:8.0-bookworm-slim (debian 12.13) - Trivy Report - 2026-02-10 04:57:41.785708737 +0000 UTC m=+12.003094460
debian
Package
Vulnerability ID
Severity
Installed Version
Fixed Version
Links
apt
CVE-2011-3374
LOW
2.6.1
https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
bash
TEMP-0841856-B18BAF
LOW
5.2.15-2+b10
bsdutils
CVE-2025-14104
MEDIUM
1:2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
bsdutils
CVE-2022-0563
LOW
1:2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
coreutils
CVE-2016-2781
LOW
9.1-1
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
https://www.cve.org/CVERecord?id=CVE-2016-2781
coreutils
CVE-2017-18018
LOW
9.1-1
http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
https://nvd.nist.gov/vuln/detail/CVE-2017-18018
https://www.cve.org/CVERecord?id=CVE-2017-18018
coreutils
CVE-2025-5278
LOW
9.1-1
http://www.openwall.com/lists/oss-security/2025/05/27/2
http://www.openwall.com/lists/oss-security/2025/05/29/1
http://www.openwall.com/lists/oss-security/2025/05/29/2
https://access.redhat.com/security/cve/CVE-2025-5278
https://bugzilla.redhat.com/show_bug.cgi?id=2368764
https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633
https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14
https://nvd.nist.gov/vuln/detail/CVE-2025-5278
https://security-tracker.debian.org/tracker/CVE-2025-5278
https://www.cve.org/CVERecord?id=CVE-2025-5278
curl
CVE-2025-10148
MEDIUM
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2025/09/10/2
http://www.openwall.com/lists/oss-security/2025/09/10/3
http://www.openwall.com/lists/oss-security/2025/09/10/4
https://access.redhat.com/security/cve/CVE-2025-10148
https://curl.se/docs/CVE-2025-10148.html
https://curl.se/docs/CVE-2025-10148.json
https://hackerone.com/reports/3330839
https://nvd.nist.gov/vuln/detail/CVE-2025-10148
https://www.cve.org/CVERecord?id=CVE-2025-10148
curl
CVE-2024-2379
LOW
7.88.1-10+deb12u14
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/2
https://access.redhat.com/security/cve/CVE-2024-2379
https://curl.se/docs/CVE-2024-2379.html
https://curl.se/docs/CVE-2024-2379.json
https://hackerone.com/reports/2410774
https://nvd.nist.gov/vuln/detail/CVE-2024-2379
https://security.netapp.com/advisory/ntap-20240531-0001/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://www.cve.org/CVERecord?id=CVE-2024-2379
curl
CVE-2025-0725
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2025/02/05/3
http://www.openwall.com/lists/oss-security/2025/02/06/2
http://www.openwall.com/lists/oss-security/2025/02/06/4
https://access.redhat.com/security/cve/CVE-2025-0725
https://curl.se/docs/CVE-2025-0725.html
https://curl.se/docs/CVE-2025-0725.json
https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7
https://hackerone.com/reports/2956023
https://nvd.nist.gov/vuln/detail/CVE-2025-0725
https://security.netapp.com/advisory/ntap-20250306-0009/
https://www.cve.org/CVERecord?id=CVE-2025-0725
curl
CVE-2025-10966
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2025/11/05/2
https://access.redhat.com/security/cve/CVE-2025-10966
https://curl.se/docs/CVE-2025-10966.html
https://curl.se/docs/CVE-2025-10966.json
https://github.com/curl/curl/commit/b011e3fcfb06d6c027859
https://hackerone.com/reports/3355218
https://nvd.nist.gov/vuln/detail/CVE-2025-10966
https://www.cve.org/CVERecord?id=CVE-2025-10966
curl
CVE-2025-14017
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/3
https://access.redhat.com/security/cve/CVE-2025-14017
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14017.json
https://nvd.nist.gov/vuln/detail/CVE-2025-14017
https://www.cve.org/CVERecord?id=CVE-2025-14017
curl
CVE-2025-14524
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/4
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14524.json
https://hackerone.com/reports/3459417
https://www.cve.org/CVERecord?id=CVE-2025-14524
curl
CVE-2025-14819
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/5
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-14819.json
https://www.cve.org/CVERecord?id=CVE-2025-14819
curl
CVE-2025-15079
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/6
https://curl.se/docs/CVE-2025-15079.html
https://curl.se/docs/CVE-2025-15079.json
https://hackerone.com/reports/3477116
https://www.cve.org/CVERecord?id=CVE-2025-15079
curl
CVE-2025-15224
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/7
https://curl.se/docs/CVE-2025-15224.html
https://curl.se/docs/CVE-2025-15224.json
https://hackerone.com/reports/3480925
https://www.cve.org/CVERecord?id=CVE-2025-15224
dpkg
CVE-2025-6297
LOW
1.21.22
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=ed6bbd445dd8800308c67236ba35d08004c98e82
https://ubuntu.com/security/notices/USN-7768-1
https://www.cve.org/CVERecord?id=CVE-2025-6297
gcc-12-base
CVE-2022-27943
LOW
12.2.0-14+deb12u1
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
gpgv
CVE-2025-30258
MEDIUM
2.2.40-1.1+deb12u2
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://ubuntu.com/security/notices/USN-7412-3
https://www.cve.org/CVERecord?id=CVE-2025-30258
gpgv
CVE-2025-68972
MEDIUM
2.2.40-1.1+deb12u2
https://access.redhat.com/security/cve/CVE-2025-68972
https://gpg.fail/formfeed
https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical-vulnerabilities-i
https://news.ycombinator.com/item?id=46404339
https://nvd.nist.gov/vuln/detail/CVE-2025-68972
https://www.cve.org/CVERecord?id=CVE-2025-68972
gpgv
CVE-2022-3219
LOW
2.2.40-1.1+deb12u2
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
krb5-locales
CVE-2018-5709
LOW
1.20.1-2+deb12u4
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
krb5-locales
CVE-2024-26458
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
krb5-locales
CVE-2024-26461
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
libapparmor1
CVE-2016-1585
LOW
3.0.8-3
https://bugs.launchpad.net/apparmor/+bug/1597017
https://gitlab.com/apparmor/apparmor/-/merge_requests/1048
https://gitlab.com/apparmor/apparmor/-/merge_requests/1054
https://gitlab.com/apparmor/apparmor/-/merge_requests/333
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1585
https://ubuntu.com/security/notices/USN-7035-1
https://www.cve.org/CVERecord?id=CVE-2016-1585
libapt-pkg6.0
CVE-2011-3374
LOW
2.6.1
https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
libasound2
CVE-2026-25068
MEDIUM
1.2.8-1+b1
https://access.redhat.com/security/cve/CVE-2026-25068
https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40
https://lists.debian.org/debian-lts-announce/2026/02/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2026-25068
https://www.cve.org/CVERecord?id=CVE-2026-25068
https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow
libasound2-data
CVE-2026-25068
MEDIUM
1.2.8-1
https://access.redhat.com/security/cve/CVE-2026-25068
https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40
https://lists.debian.org/debian-lts-announce/2026/02/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2026-25068
https://www.cve.org/CVERecord?id=CVE-2026-25068
https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow
libavahi-client3
CVE-2024-52615
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/errata/RHSA-2025:11402
https://access.redhat.com/errata/RHSA-2025:16441
https://access.redhat.com/security/cve/CVE-2024-52615
https://bugzilla.redhat.com/show_bug.cgi?id=2326418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
https://errata.rockylinux.org/RLSA-2025:11402
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g
https://linux.oracle.com/cve/CVE-2024-52615.html
https://linux.oracle.com/errata/ELSA-2025-16441.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
https://www.cve.org/CVERecord?id=CVE-2024-52615
libavahi-client3
CVE-2024-52616
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/errata/RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616
https://bugzilla.redhat.com/2326429
https://bugzilla.redhat.com/show_bug.cgi?id=2326429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616
https://errata.almalinux.org/9/ALSA-2025-7437.html
https://errata.rockylinux.org/RLSA-2025:7437
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm
https://linux.oracle.com/cve/CVE-2024-52616.html
https://linux.oracle.com/errata/ELSA-2025-7437.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52616
https://www.cve.org/CVERecord?id=CVE-2024-52616
libavahi-client3
CVE-2025-59529
MEDIUM
0.8-10+deb12u1
http://www.openwall.com/lists/oss-security/2025/12/19/1
https://access.redhat.com/security/cve/CVE-2025-59529
https://github.com/avahi/avahi/pull/808
https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q
https://nvd.nist.gov/vuln/detail/CVE-2025-59529
https://www.cve.org/CVERecord?id=CVE-2025-59529
https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529
libavahi-client3
CVE-2025-68276
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68276
https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688
https://github.com/avahi/avahi/pull/806
https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc
https://nvd.nist.gov/vuln/detail/CVE-2025-68276
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68276
libavahi-client3
CVE-2025-68468
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68468
https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a
https://github.com/avahi/avahi/issues/683
https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52
https://nvd.nist.gov/vuln/detail/CVE-2025-68468
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68468
libavahi-client3
CVE-2025-68471
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68471
https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1
https://github.com/avahi/avahi/issues/678
https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg
https://nvd.nist.gov/vuln/detail/CVE-2025-68471
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68471
libavahi-client3
CVE-2026-24401
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2026-24401
https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524
https://github.com/avahi/avahi/issues/501
https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3
https://nvd.nist.gov/vuln/detail/CVE-2026-24401
https://www.cve.org/CVERecord?id=CVE-2026-24401
libavahi-common-data
CVE-2024-52615
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/errata/RHSA-2025:11402
https://access.redhat.com/errata/RHSA-2025:16441
https://access.redhat.com/security/cve/CVE-2024-52615
https://bugzilla.redhat.com/show_bug.cgi?id=2326418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
https://errata.rockylinux.org/RLSA-2025:11402
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g
https://linux.oracle.com/cve/CVE-2024-52615.html
https://linux.oracle.com/errata/ELSA-2025-16441.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
https://www.cve.org/CVERecord?id=CVE-2024-52615
libavahi-common-data
CVE-2024-52616
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/errata/RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616
https://bugzilla.redhat.com/2326429
https://bugzilla.redhat.com/show_bug.cgi?id=2326429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616
https://errata.almalinux.org/9/ALSA-2025-7437.html
https://errata.rockylinux.org/RLSA-2025:7437
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm
https://linux.oracle.com/cve/CVE-2024-52616.html
https://linux.oracle.com/errata/ELSA-2025-7437.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52616
https://www.cve.org/CVERecord?id=CVE-2024-52616
libavahi-common-data
CVE-2025-59529
MEDIUM
0.8-10+deb12u1
http://www.openwall.com/lists/oss-security/2025/12/19/1
https://access.redhat.com/security/cve/CVE-2025-59529
https://github.com/avahi/avahi/pull/808
https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q
https://nvd.nist.gov/vuln/detail/CVE-2025-59529
https://www.cve.org/CVERecord?id=CVE-2025-59529
https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529
libavahi-common-data
CVE-2025-68276
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68276
https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688
https://github.com/avahi/avahi/pull/806
https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc
https://nvd.nist.gov/vuln/detail/CVE-2025-68276
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68276
libavahi-common-data
CVE-2025-68468
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68468
https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a
https://github.com/avahi/avahi/issues/683
https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52
https://nvd.nist.gov/vuln/detail/CVE-2025-68468
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68468
libavahi-common-data
CVE-2025-68471
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68471
https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1
https://github.com/avahi/avahi/issues/678
https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg
https://nvd.nist.gov/vuln/detail/CVE-2025-68471
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68471
libavahi-common-data
CVE-2026-24401
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2026-24401
https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524
https://github.com/avahi/avahi/issues/501
https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3
https://nvd.nist.gov/vuln/detail/CVE-2026-24401
https://www.cve.org/CVERecord?id=CVE-2026-24401
libavahi-common3
CVE-2024-52615
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/errata/RHSA-2025:11402
https://access.redhat.com/errata/RHSA-2025:16441
https://access.redhat.com/security/cve/CVE-2024-52615
https://bugzilla.redhat.com/show_bug.cgi?id=2326418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
https://errata.rockylinux.org/RLSA-2025:11402
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g
https://linux.oracle.com/cve/CVE-2024-52615.html
https://linux.oracle.com/errata/ELSA-2025-16441.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
https://www.cve.org/CVERecord?id=CVE-2024-52615
libavahi-common3
CVE-2024-52616
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/errata/RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616
https://bugzilla.redhat.com/2326429
https://bugzilla.redhat.com/show_bug.cgi?id=2326429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616
https://errata.almalinux.org/9/ALSA-2025-7437.html
https://errata.rockylinux.org/RLSA-2025:7437
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm
https://linux.oracle.com/cve/CVE-2024-52616.html
https://linux.oracle.com/errata/ELSA-2025-7437.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52616
https://www.cve.org/CVERecord?id=CVE-2024-52616
libavahi-common3
CVE-2025-59529
MEDIUM
0.8-10+deb12u1
http://www.openwall.com/lists/oss-security/2025/12/19/1
https://access.redhat.com/security/cve/CVE-2025-59529
https://github.com/avahi/avahi/pull/808
https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q
https://nvd.nist.gov/vuln/detail/CVE-2025-59529
https://www.cve.org/CVERecord?id=CVE-2025-59529
https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529
libavahi-common3
CVE-2025-68276
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68276
https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688
https://github.com/avahi/avahi/pull/806
https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc
https://nvd.nist.gov/vuln/detail/CVE-2025-68276
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68276
libavahi-common3
CVE-2025-68468
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68468
https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a
https://github.com/avahi/avahi/issues/683
https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52
https://nvd.nist.gov/vuln/detail/CVE-2025-68468
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68468
libavahi-common3
CVE-2025-68471
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2025-68471
https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1
https://github.com/avahi/avahi/issues/678
https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg
https://nvd.nist.gov/vuln/detail/CVE-2025-68471
https://ubuntu.com/security/notices/USN-7967-1
https://www.cve.org/CVERecord?id=CVE-2025-68471
libavahi-common3
CVE-2026-24401
MEDIUM
0.8-10+deb12u1
https://access.redhat.com/security/cve/CVE-2026-24401
https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524
https://github.com/avahi/avahi/issues/501
https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3
https://nvd.nist.gov/vuln/detail/CVE-2026-24401
https://www.cve.org/CVERecord?id=CVE-2026-24401
libblkid1
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
libblkid1
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
libc-bin
CVE-2026-0861
HIGH
2.36-9+deb12u13
http://www.openwall.com/lists/oss-security/2026/01/16/5
https://access.redhat.com/errata/RHSA-2026:1334
https://access.redhat.com/security/cve/CVE-2026-0861
https://bugzilla.redhat.com/2429771
https://bugzilla.redhat.com/2430201
https://bugzilla.redhat.com/show_bug.cgi?id=2429771
https://bugzilla.redhat.com/show_bug.cgi?id=2430201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
https://errata.almalinux.org/10/ALSA-2026-1334.html
https://errata.rockylinux.org/RLSA-2026:1334
https://linux.oracle.com/cve/CVE-2026-0861.html
https://linux.oracle.com/errata/ELSA-2026-50078.html
https://nvd.nist.gov/vuln/detail/CVE-2026-0861
https://sourceware.org/bugzilla/show_bug.cgi?id=33796
https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001
https://ubuntu.com/security/notices/USN-8005-1
https://www.cve.org/CVERecord?id=CVE-2026-0861
libc-bin
CVE-2025-15281
MEDIUM
2.36-9+deb12u13
http://www.openwall.com/lists/oss-security/2026/01/20/3
https://access.redhat.com/security/cve/CVE-2025-15281
https://nvd.nist.gov/vuln/detail/CVE-2025-15281
https://sourceware.org/bugzilla/show_bug.cgi?id=33814
https://ubuntu.com/security/notices/USN-8005-1
https://www.cve.org/CVERecord?id=CVE-2025-15281
https://www.openwall.com/lists/oss-security/2026/01/20/3
libc-bin
CVE-2026-0915
MEDIUM
2.36-9+deb12u13
http://www.openwall.com/lists/oss-security/2026/01/16/6
https://access.redhat.com/errata/RHSA-2026:1334
https://access.redhat.com/security/cve/CVE-2026-0915
https://bugzilla.redhat.com/2429771
https://bugzilla.redhat.com/2430201
https://bugzilla.redhat.com/show_bug.cgi?id=2429771
https://bugzilla.redhat.com/show_bug.cgi?id=2430201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
https://errata.almalinux.org/10/ALSA-2026-1334.html
https://errata.rockylinux.org/RLSA-2026:1334
https://linux.oracle.com/cve/CVE-2026-0915.html
https://linux.oracle.com/errata/ELSA-2026-50078.html
https://nvd.nist.gov/vuln/detail/CVE-2026-0915
https://sourceware.org/bugzilla/show_bug.cgi?id=33802
https://ubuntu.com/security/notices/USN-8005-1
https://www.cve.org/CVERecord?id=CVE-2026-0915
https://www.openwall.com/lists/oss-security/2026/01/16/6
libc-bin
CVE-2010-4756
LOW
2.36-9+deb12u13
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
https://security.netapp.com/advisory/ntap-20241108-0002/
https://www.cve.org/CVERecord?id=CVE-2010-4756
libc-bin
CVE-2018-20796
LOW
2.36-9+deb12u13
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2018-20796
libc-bin
CVE-2019-1010022
LOW
2.36-9+deb12u13
https://access.redhat.com/security/cve/CVE-2019-1010022
https://nvd.nist.gov/vuln/detail/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
https://www.cve.org/CVERecord?id=CVE-2019-1010022
libc-bin
CVE-2019-1010023
LOW
2.36-9+deb12u13
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://nvd.nist.gov/vuln/detail/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
https://www.cve.org/CVERecord?id=CVE-2019-1010023
libc-bin
CVE-2019-1010024
LOW
2.36-9+deb12u13
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://nvd.nist.gov/vuln/detail/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
https://www.cve.org/CVERecord?id=CVE-2019-1010024
libc-bin
CVE-2019-1010025
LOW
2.36-9+deb12u13
https://access.redhat.com/security/cve/CVE-2019-1010025
https://nvd.nist.gov/vuln/detail/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
https://www.cve.org/CVERecord?id=CVE-2019-1010025
libc-bin
CVE-2019-9192
LOW
2.36-9+deb12u13
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2019-9192
libc6
CVE-2026-0861
HIGH
2.36-9+deb12u13
http://www.openwall.com/lists/oss-security/2026/01/16/5
https://access.redhat.com/errata/RHSA-2026:1334
https://access.redhat.com/security/cve/CVE-2026-0861
https://bugzilla.redhat.com/2429771
https://bugzilla.redhat.com/2430201
https://bugzilla.redhat.com/show_bug.cgi?id=2429771
https://bugzilla.redhat.com/show_bug.cgi?id=2430201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
https://errata.almalinux.org/10/ALSA-2026-1334.html
https://errata.rockylinux.org/RLSA-2026:1334
https://linux.oracle.com/cve/CVE-2026-0861.html
https://linux.oracle.com/errata/ELSA-2026-50078.html
https://nvd.nist.gov/vuln/detail/CVE-2026-0861
https://sourceware.org/bugzilla/show_bug.cgi?id=33796
https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001
https://ubuntu.com/security/notices/USN-8005-1
https://www.cve.org/CVERecord?id=CVE-2026-0861
libc6
CVE-2025-15281
MEDIUM
2.36-9+deb12u13
http://www.openwall.com/lists/oss-security/2026/01/20/3
https://access.redhat.com/security/cve/CVE-2025-15281
https://nvd.nist.gov/vuln/detail/CVE-2025-15281
https://sourceware.org/bugzilla/show_bug.cgi?id=33814
https://ubuntu.com/security/notices/USN-8005-1
https://www.cve.org/CVERecord?id=CVE-2025-15281
https://www.openwall.com/lists/oss-security/2026/01/20/3
libc6
CVE-2026-0915
MEDIUM
2.36-9+deb12u13
http://www.openwall.com/lists/oss-security/2026/01/16/6
https://access.redhat.com/errata/RHSA-2026:1334
https://access.redhat.com/security/cve/CVE-2026-0915
https://bugzilla.redhat.com/2429771
https://bugzilla.redhat.com/2430201
https://bugzilla.redhat.com/show_bug.cgi?id=2429771
https://bugzilla.redhat.com/show_bug.cgi?id=2430201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
https://errata.almalinux.org/10/ALSA-2026-1334.html
https://errata.rockylinux.org/RLSA-2026:1334
https://linux.oracle.com/cve/CVE-2026-0915.html
https://linux.oracle.com/errata/ELSA-2026-50078.html
https://nvd.nist.gov/vuln/detail/CVE-2026-0915
https://sourceware.org/bugzilla/show_bug.cgi?id=33802
https://ubuntu.com/security/notices/USN-8005-1
https://www.cve.org/CVERecord?id=CVE-2026-0915
https://www.openwall.com/lists/oss-security/2026/01/16/6
libc6
CVE-2010-4756
LOW
2.36-9+deb12u13
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
https://security.netapp.com/advisory/ntap-20241108-0002/
https://www.cve.org/CVERecord?id=CVE-2010-4756
libc6
CVE-2018-20796
LOW
2.36-9+deb12u13
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2018-20796
libc6
CVE-2019-1010022
LOW
2.36-9+deb12u13
https://access.redhat.com/security/cve/CVE-2019-1010022
https://nvd.nist.gov/vuln/detail/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
https://www.cve.org/CVERecord?id=CVE-2019-1010022
libc6
CVE-2019-1010023
LOW
2.36-9+deb12u13
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://nvd.nist.gov/vuln/detail/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
https://www.cve.org/CVERecord?id=CVE-2019-1010023
libc6
CVE-2019-1010024
LOW
2.36-9+deb12u13
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://nvd.nist.gov/vuln/detail/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
https://www.cve.org/CVERecord?id=CVE-2019-1010024
libc6
CVE-2019-1010025
LOW
2.36-9+deb12u13
https://access.redhat.com/security/cve/CVE-2019-1010025
https://nvd.nist.gov/vuln/detail/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
https://www.cve.org/CVERecord?id=CVE-2019-1010025
libc6
CVE-2019-9192
LOW
2.36-9+deb12u13
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2019-9192
libcairo2
CVE-2017-7475
LOW
1.16.0-7
http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://github.com/rcairo/rcairo
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cairo/CVE-2017-7475.yml
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
https://www.cve.org/CVERecord?id=CVE-2017-7475
libcairo2
CVE-2018-18064
LOW
1.16.0-7
https://access.redhat.com/security/cve/CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-18064
https://www.cve.org/CVERecord?id=CVE-2018-18064
libcairo2
CVE-2019-6461
LOW
1.16.0-7
https://access.redhat.com/security/cve/CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
https://www.cve.org/CVERecord?id=CVE-2019-6461
libcairo2
CVE-2019-6462
LOW
1.16.0-7
https://access.redhat.com/security/cve/CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
https://www.cve.org/CVERecord?id=CVE-2019-6462
libcairo2
CVE-2025-50422
LOW
1.16.0-7
http://freedesktop.com
http://poppler.com
https://access.redhat.com/security/cve/CVE-2025-50422
https://github.com/Landw-hub/CVE-2025-50422
https://gitlab.freedesktop.org/cairo/cairo/-/merge_requests/621
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1591
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1591#note_3045081
https://nvd.nist.gov/vuln/detail/CVE-2025-50422
https://www.cve.org/CVERecord?id=CVE-2025-50422
libcups2
CVE-2025-58436
MEDIUM
2.4.2-3+deb12u9
http://www.openwall.com/lists/oss-security/2025/11/27/4
https://access.redhat.com/errata/RHSA-2026:0596
https://access.redhat.com/security/cve/CVE-2025-58436
https://bugzilla.redhat.com/2416039
https://bugzilla.redhat.com/2416040
https://bugzilla.redhat.com/show_bug.cgi?id=2416039
https://bugzilla.redhat.com/show_bug.cgi?id=2416040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61915
https://errata.almalinux.org/8/ALSA-2026-0596.html
https://errata.rockylinux.org/RLSA-2026:0312
https://github.com/OpenPrinting/cups/commit/40008d76a001babbb9beb9d9d74b01a86fb6ddb4
https://github.com/OpenPrinting/cups/releases/tag/v2.4.15
https://github.com/OpenPrinting/cups/security/advisories/GHSA-8wpw-vfgm-qrrr
https://linux.oracle.com/cve/CVE-2025-58436.html
https://linux.oracle.com/errata/ELSA-2026-0596.html
https://nvd.nist.gov/vuln/detail/CVE-2025-58436
https://ubuntu.com/security/notices/USN-7912-1
https://ubuntu.com/security/notices/USN-7912-2
https://www.cve.org/CVERecord?id=CVE-2025-58436
libcups2
CVE-2025-61915
MEDIUM
2.4.2-3+deb12u9
http://www.openwall.com/lists/oss-security/2025/11/27/5
https://access.redhat.com/errata/RHSA-2026:0596
https://access.redhat.com/security/cve/CVE-2025-61915
https://bugzilla.redhat.com/2416039
https://bugzilla.redhat.com/2416040
https://bugzilla.redhat.com/show_bug.cgi?id=2416039
https://bugzilla.redhat.com/show_bug.cgi?id=2416040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61915
https://errata.almalinux.org/8/ALSA-2026-0596.html
https://errata.rockylinux.org/RLSA-2026:0312
https://github.com/OpenPrinting/cups/commit/db8d560262c22a21ee1e55dfd62fa98d9359bcb0
https://github.com/OpenPrinting/cups/releases/tag/v2.4.15
https://github.com/OpenPrinting/cups/security/advisories/GHSA-hxm8-vfpq-jrfc
https://linux.oracle.com/cve/CVE-2025-61915.html
https://linux.oracle.com/errata/ELSA-2026-0596.html
https://nvd.nist.gov/vuln/detail/CVE-2025-61915
https://ubuntu.com/security/notices/USN-7897-1
https://www.cve.org/CVERecord?id=CVE-2025-61915
libcups2
CVE-2014-8166
LOW
2.4.2-3+deb12u9
http://www.openwall.com/lists/oss-security/2015/03/24/15
http://www.openwall.com/lists/oss-security/2015/03/24/2
http://www.securityfocus.com/bid/73300
https://access.redhat.com/security/cve/CVE-2014-8166
https://bugzilla.redhat.com/show_bug.cgi?id=1084577
https://nvd.nist.gov/vuln/detail/CVE-2014-8166
https://www.cve.org/CVERecord?id=CVE-2014-8166
libcurl4
CVE-2025-10148
MEDIUM
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2025/09/10/2
http://www.openwall.com/lists/oss-security/2025/09/10/3
http://www.openwall.com/lists/oss-security/2025/09/10/4
https://access.redhat.com/security/cve/CVE-2025-10148
https://curl.se/docs/CVE-2025-10148.html
https://curl.se/docs/CVE-2025-10148.json
https://hackerone.com/reports/3330839
https://nvd.nist.gov/vuln/detail/CVE-2025-10148
https://www.cve.org/CVERecord?id=CVE-2025-10148
libcurl4
CVE-2024-2379
LOW
7.88.1-10+deb12u14
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/2
https://access.redhat.com/security/cve/CVE-2024-2379
https://curl.se/docs/CVE-2024-2379.html
https://curl.se/docs/CVE-2024-2379.json
https://hackerone.com/reports/2410774
https://nvd.nist.gov/vuln/detail/CVE-2024-2379
https://security.netapp.com/advisory/ntap-20240531-0001/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://www.cve.org/CVERecord?id=CVE-2024-2379
libcurl4
CVE-2025-0725
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2025/02/05/3
http://www.openwall.com/lists/oss-security/2025/02/06/2
http://www.openwall.com/lists/oss-security/2025/02/06/4
https://access.redhat.com/security/cve/CVE-2025-0725
https://curl.se/docs/CVE-2025-0725.html
https://curl.se/docs/CVE-2025-0725.json
https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7
https://hackerone.com/reports/2956023
https://nvd.nist.gov/vuln/detail/CVE-2025-0725
https://security.netapp.com/advisory/ntap-20250306-0009/
https://www.cve.org/CVERecord?id=CVE-2025-0725
libcurl4
CVE-2025-10966
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2025/11/05/2
https://access.redhat.com/security/cve/CVE-2025-10966
https://curl.se/docs/CVE-2025-10966.html
https://curl.se/docs/CVE-2025-10966.json
https://github.com/curl/curl/commit/b011e3fcfb06d6c027859
https://hackerone.com/reports/3355218
https://nvd.nist.gov/vuln/detail/CVE-2025-10966
https://www.cve.org/CVERecord?id=CVE-2025-10966
libcurl4
CVE-2025-14017
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/3
https://access.redhat.com/security/cve/CVE-2025-14017
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14017.json
https://nvd.nist.gov/vuln/detail/CVE-2025-14017
https://www.cve.org/CVERecord?id=CVE-2025-14017
libcurl4
CVE-2025-14524
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/4
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14524.json
https://hackerone.com/reports/3459417
https://www.cve.org/CVERecord?id=CVE-2025-14524
libcurl4
CVE-2025-14819
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/5
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-14819.json
https://www.cve.org/CVERecord?id=CVE-2025-14819
libcurl4
CVE-2025-15079
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/6
https://curl.se/docs/CVE-2025-15079.html
https://curl.se/docs/CVE-2025-15079.json
https://hackerone.com/reports/3477116
https://www.cve.org/CVERecord?id=CVE-2025-15079
libcurl4
CVE-2025-15224
LOW
7.88.1-10+deb12u14
http://www.openwall.com/lists/oss-security/2026/01/07/7
https://curl.se/docs/CVE-2025-15224.html
https://curl.se/docs/CVE-2025-15224.json
https://hackerone.com/reports/3480925
https://www.cve.org/CVERecord?id=CVE-2025-15224
libegl-mesa0
CVE-2023-45913
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176800/Mesa-23.0.4-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/28
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9856
https://seclists.org/fulldisclosure/2024/Jan/71
libegl-mesa0
CVE-2023-45919
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176802/Mesa-23.0.4-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Jan/47
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9858
libegl-mesa0
CVE-2023-45922
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176805/Mesa-23.0.4-Buffer-Overflow-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/50
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9857
libegl-mesa0
CVE-2023-45931
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176813/Mesa-23.0.4-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/59
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9859
https://seclists.org/fulldisclosure/2024/Jan/71
libegl1
CVE-2023-45924
LOW
1.6.0-1
http://packetstormsecurity.com/files/176807/libglvnd-bb06db5a-Buffer-Overflow-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/52
https://gitlab.freedesktop.org/glvnd/libglvnd/-/issues/242
https://gitlab.freedesktop.org/glvnd/libglvnd/-/merge_requests/295
libexpat1
CVE-2025-59375
MEDIUM
2.5.0-1+deb12u2
http://www.openwall.com/lists/oss-security/2025/09/16/2
https://access.redhat.com/errata/RHSA-2025:21974
https://access.redhat.com/security/cve/CVE-2025-59375
https://bugzilla.redhat.com/2395108
https://bugzilla.redhat.com/show_bug.cgi?id=2395108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375
https://errata.almalinux.org/8/ALSA-2025-21974.html
https://errata.rockylinux.org/RLSA-2025:22175
https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74
https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes
https://github.com/libexpat/libexpat/issues/1018
https://github.com/libexpat/libexpat/pull/1034
https://issues.oss-fuzz.com/issues/439133977
https://linux.oracle.com/cve/CVE-2025-59375.html
https://linux.oracle.com/errata/ELSA-2025-22175.html
https://nvd.nist.gov/vuln/detail/CVE-2025-59375
https://www.cve.org/CVERecord?id=CVE-2025-59375
libexpat1
CVE-2025-66382
MEDIUM
2.5.0-1+deb12u2
http://www.openwall.com/lists/oss-security/2025/12/02/1
https://access.redhat.com/security/cve/CVE-2025-66382
https://github.com/libexpat/libexpat/issues/1076
https://nvd.nist.gov/vuln/detail/CVE-2025-66382
https://www.cve.org/CVERecord?id=CVE-2025-66382
libexpat1
CVE-2026-25210
MEDIUM
2.5.0-1+deb12u2
https://access.redhat.com/security/cve/CVE-2026-25210
https://github.com/libexpat/libexpat/pull/1075
https://github.com/libexpat/libexpat/pull/1075/commits/9c2d990389e6abe2e44527eeaa8b39f16fe859c7
https://nvd.nist.gov/vuln/detail/CVE-2026-25210
https://www.cve.org/CVERecord?id=CVE-2026-25210
libexpat1
CVE-2023-52426
LOW
2.5.0-1+deb12u2
https://access.redhat.com/security/cve/CVE-2023-52426
https://cwe.mitre.org/data/definitions/776.html
https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404
https://github.com/libexpat/libexpat/pull/777
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://nvd.nist.gov/vuln/detail/CVE-2023-52426
https://security.netapp.com/advisory/ntap-20240307-0005/
https://www.cve.org/CVERecord?id=CVE-2023-52426
libexpat1
CVE-2024-28757
LOW
2.5.0-1+deb12u2
http://www.openwall.com/lists/oss-security/2024/03/15/1
https://access.redhat.com/errata/RHSA-2024:1530
https://access.redhat.com/security/cve/CVE-2024-28757
https://bugzilla.redhat.com/2262877
https://bugzilla.redhat.com/2268766
https://errata.almalinux.org/9/ALSA-2024-1530.html
https://github.com/libexpat/libexpat/issues/839
https://github.com/libexpat/libexpat/pull/842
https://linux.oracle.com/cve/CVE-2024-28757.html
https://linux.oracle.com/errata/ELSA-2024-1530.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/
https://nvd.nist.gov/vuln/detail/CVE-2024-28757
https://security.netapp.com/advisory/ntap-20240322-0001/
https://ubuntu.com/security/notices/USN-6694-1
https://www.cve.org/CVERecord?id=CVE-2024-28757
libexpat1
CVE-2026-24515
LOW
2.5.0-1+deb12u2
https://access.redhat.com/security/cve/CVE-2026-24515
https://github.com/libexpat/libexpat/pull/1131
https://nvd.nist.gov/vuln/detail/CVE-2026-24515
https://www.cve.org/CVERecord?id=CVE-2026-24515
libfdisk1
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
libfdisk1
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
libgbm1
CVE-2023-45913
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176800/Mesa-23.0.4-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/28
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9856
https://seclists.org/fulldisclosure/2024/Jan/71
libgbm1
CVE-2023-45919
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176802/Mesa-23.0.4-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Jan/47
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9858
libgbm1
CVE-2023-45922
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176805/Mesa-23.0.4-Buffer-Overflow-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/50
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9857
libgbm1
CVE-2023-45931
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176813/Mesa-23.0.4-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/59
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9859
https://seclists.org/fulldisclosure/2024/Jan/71
libgcc-s1
CVE-2022-27943
LOW
12.2.0-14+deb12u1
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
libgcrypt20
CVE-2018-6829
LOW
1.10.1-3
https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6829
https://www.cve.org/CVERecord?id=CVE-2018-6829
https://www.oracle.com/security-alerts/cpujan2020.html
libgcrypt20
CVE-2024-2236
LOW
1.10.1-3
https://access.redhat.com/errata/RHSA-2024:9404
https://access.redhat.com/errata/RHSA-2025:3530
https://access.redhat.com/errata/RHSA-2025:3534
https://access.redhat.com/security/cve/CVE-2024-2236
https://bugzilla.redhat.com/2245218
https://bugzilla.redhat.com/show_bug.cgi?id=2245218
https://bugzilla.redhat.com/show_bug.cgi?id=2268268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2236
https://dev.gnupg.org/T7136
https://errata.almalinux.org/9/ALSA-2024-9404.html
https://errata.rockylinux.org/RLSA-2024:9404
https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt
https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17
https://linux.oracle.com/cve/CVE-2024-2236.html
https://linux.oracle.com/errata/ELSA-2024-9404.html
https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html
https://nvd.nist.gov/vuln/detail/CVE-2024-2236
https://www.cve.org/CVERecord?id=CVE-2024-2236
libglapi-mesa
CVE-2023-45913
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176800/Mesa-23.0.4-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/28
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9856
https://seclists.org/fulldisclosure/2024/Jan/71
libglapi-mesa
CVE-2023-45919
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176802/Mesa-23.0.4-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Jan/47
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9858
libglapi-mesa
CVE-2023-45922
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176805/Mesa-23.0.4-Buffer-Overflow-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/50
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9857
libglapi-mesa
CVE-2023-45931
LOW
22.3.6-1+deb12u1
http://packetstormsecurity.com/files/176813/Mesa-23.0.4-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/59
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9859
https://seclists.org/fulldisclosure/2024/Jan/71
libglib2.0-0
CVE-2026-1484
MEDIUM
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-1484
https://bugzilla.redhat.com/show_bug.cgi?id=2433259
https://nvd.nist.gov/vuln/detail/CVE-2026-1484
https://ubuntu.com/security/notices/USN-8017-1
https://www.cve.org/CVERecord?id=CVE-2026-1484
libglib2.0-0
CVE-2026-1489
MEDIUM
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-1489
https://bugzilla.redhat.com/show_bug.cgi?id=2433348
https://nvd.nist.gov/vuln/detail/CVE-2026-1489
https://ubuntu.com/security/notices/USN-8017-1
https://www.cve.org/CVERecord?id=CVE-2026-1489
libglib2.0-0
CVE-2012-0039
LOW
2.74.6-2+deb12u8
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
https://nvd.nist.gov/vuln/detail/CVE-2012-0039
https://www.cve.org/CVERecord?id=CVE-2012-0039
libglib2.0-0
CVE-2026-0988
LOW
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-0988
https://bugzilla.redhat.com/show_bug.cgi?id=2429886
https://nvd.nist.gov/vuln/detail/CVE-2026-0988
https://ubuntu.com/security/notices/USN-7971-1
https://www.cve.org/CVERecord?id=CVE-2026-0988
libglib2.0-0
CVE-2026-1485
LOW
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-1485
https://bugzilla.redhat.com/show_bug.cgi?id=2433325
https://nvd.nist.gov/vuln/detail/CVE-2026-1485
https://ubuntu.com/security/notices/USN-8017-1
https://www.cve.org/CVERecord?id=CVE-2026-1485
libglib2.0-data
CVE-2026-1484
MEDIUM
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-1484
https://bugzilla.redhat.com/show_bug.cgi?id=2433259
https://nvd.nist.gov/vuln/detail/CVE-2026-1484
https://ubuntu.com/security/notices/USN-8017-1
https://www.cve.org/CVERecord?id=CVE-2026-1484
libglib2.0-data
CVE-2026-1489
MEDIUM
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-1489
https://bugzilla.redhat.com/show_bug.cgi?id=2433348
https://nvd.nist.gov/vuln/detail/CVE-2026-1489
https://ubuntu.com/security/notices/USN-8017-1
https://www.cve.org/CVERecord?id=CVE-2026-1489
libglib2.0-data
CVE-2012-0039
LOW
2.74.6-2+deb12u8
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
https://nvd.nist.gov/vuln/detail/CVE-2012-0039
https://www.cve.org/CVERecord?id=CVE-2012-0039
libglib2.0-data
CVE-2026-0988
LOW
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-0988
https://bugzilla.redhat.com/show_bug.cgi?id=2429886
https://nvd.nist.gov/vuln/detail/CVE-2026-0988
https://ubuntu.com/security/notices/USN-7971-1
https://www.cve.org/CVERecord?id=CVE-2026-0988
libglib2.0-data
CVE-2026-1485
LOW
2.74.6-2+deb12u8
https://access.redhat.com/security/cve/CVE-2026-1485
https://bugzilla.redhat.com/show_bug.cgi?id=2433325
https://nvd.nist.gov/vuln/detail/CVE-2026-1485
https://ubuntu.com/security/notices/USN-8017-1
https://www.cve.org/CVERecord?id=CVE-2026-1485
libglvnd0
CVE-2023-45924
LOW
1.6.0-1
http://packetstormsecurity.com/files/176807/libglvnd-bb06db5a-Buffer-Overflow-Null-Pointer.html
http://seclists.org/fulldisclosure/2024/Jan/52
https://gitlab.freedesktop.org/glvnd/libglvnd/-/issues/242
https://gitlab.freedesktop.org/glvnd/libglvnd/-/merge_requests/295
libgnutls30
CVE-2025-9820
MEDIUM
3.7.9-2+deb12u5
http://www.openwall.com/lists/oss-security/2025/11/20/2
https://access.redhat.com/security/cve/CVE-2025-9820
https://bugzilla.redhat.com/show_bug.cgi?id=2392528
https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
https://gitlab.com/gnutls/gnutls/-/issues/1732
https://nvd.nist.gov/vuln/detail/CVE-2025-9820
https://www.cve.org/CVERecord?id=CVE-2025-9820
https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
libgnutls30
CVE-2011-3389
LOW
3.7.9-2+deb12u5
http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://nvd.nist.gov/vuln/detail/CVE-2011-3389
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
https://www.cve.org/CVERecord?id=CVE-2011-3389
libgssapi-krb5-2
CVE-2018-5709
LOW
1.20.1-2+deb12u4
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
libgssapi-krb5-2
CVE-2024-26458
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
libgssapi-krb5-2
CVE-2024-26461
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
libharfbuzz0b
CVE-2023-25193
HIGH
6.0.0+dfsg-3
https://access.redhat.com/errata/RHSA-2024:2980
https://access.redhat.com/security/cve/CVE-2023-25193
https://bugzilla.redhat.com/2167254
https://bugzilla.redhat.com/show_bug.cgi?id=2167254
https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193
https://errata.almalinux.org/8/ALSA-2024-2980.html
https://errata.rockylinux.org/RLSA-2024:2410
https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc (reverted)
https://linux.oracle.com/cve/CVE-2023-25193.html
https://linux.oracle.com/errata/ELSA-2024-2980.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
https://nvd.nist.gov/vuln/detail/CVE-2023-25193
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://ubuntu.com/security/notices/USN-7251-1
https://www.cve.org/CVERecord?id=CVE-2023-25193
libharfbuzz0b
CVE-2026-22693
MEDIUM
6.0.0+dfsg-3
http://www.openwall.com/lists/oss-security/2026/01/11/1
http://www.openwall.com/lists/oss-security/2026/01/12/1
https://access.redhat.com/security/cve/CVE-2026-22693
https://github.com/harfbuzz/harfbuzz/commit/1265ff8d990284f04d8768f35b0e20ae5f60daae
https://github.com/harfbuzz/harfbuzz/security/advisories/GHSA-xvjr-f2r9-c7ww
https://nvd.nist.gov/vuln/detail/CVE-2026-22693
https://www.cve.org/CVERecord?id=CVE-2026-22693
libicu70
CVE-2025-5222
HIGH
70.1-2
72.1-3+deb12u1
https://access.redhat.com/errata/RHSA-2025:11888
https://access.redhat.com/errata/RHSA-2025:12083
https://access.redhat.com/errata/RHSA-2025:12331
https://access.redhat.com/errata/RHSA-2025:12332
https://access.redhat.com/errata/RHSA-2025:12333
https://access.redhat.com/security/cve/CVE-2025-5222
https://bugzilla.redhat.com/2368600
https://bugzilla.redhat.com/show_bug.cgi?id=2368600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5222
https://errata.almalinux.org/9/ALSA-2025-12083.html
https://errata.rockylinux.org/RLSA-2025:12083
https://linux.oracle.com/cve/CVE-2025-5222.html
https://linux.oracle.com/errata/ELSA-2025-12083.html
https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2025-5222
https://www.cve.org/CVERecord?id=CVE-2025-5222
libip4tc2
CVE-2012-2663
LOW
1.8.9-2
http://www.spinics.net/lists/netfilter-devel/msg21248.html
https://access.redhat.com/security/cve/CVE-2012-2663
https://bugzilla.redhat.com/show_bug.cgi?id=826702
https://nvd.nist.gov/vuln/detail/CVE-2012-2663
https://www.cve.org/CVERecord?id=CVE-2012-2663
libk5crypto3
CVE-2018-5709
LOW
1.20.1-2+deb12u4
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
libk5crypto3
CVE-2024-26458
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
libk5crypto3
CVE-2024-26461
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
libkrb5-3
CVE-2018-5709
LOW
1.20.1-2+deb12u4
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
libkrb5-3
CVE-2024-26458
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
libkrb5-3
CVE-2024-26461
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
libkrb5support0
CVE-2018-5709
LOW
1.20.1-2+deb12u4
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
libkrb5support0
CVE-2024-26458
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
libkrb5support0
CVE-2024-26461
LOW
1.20.1-2+deb12u4
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
libldap-2.5-0
CVE-2023-2953
HIGH
2.5.13+dfsg-5
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2024:4264
https://access.redhat.com/security/cve/CVE-2023-2953
https://bugs.openldap.org/show_bug.cgi?id=9904
https://bugzilla.redhat.com/2210651
https://bugzilla.redhat.com/show_bug.cgi?id=2210651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953
https://errata.almalinux.org/8/ALSA-2024-4264.html
https://errata.rockylinux.org/RLSA-2024:4264
https://linux.oracle.com/cve/CVE-2023-2953.html
https://linux.oracle.com/errata/ELSA-2024-4264.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2953
https://security.netapp.com/advisory/ntap-20230703-0005/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6197-1
https://ubuntu.com/security/notices/USN-6616-1
https://www.cve.org/CVERecord?id=CVE-2023-2953
libldap-2.5-0
CVE-2015-3276
LOW
2.5.13+dfsg-5
http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
https://www.cve.org/CVERecord?id=CVE-2015-3276
libldap-2.5-0
CVE-2017-14159
LOW
2.5.13+dfsg-5
http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://nvd.nist.gov/vuln/detail/CVE-2017-14159
https://www.cve.org/CVERecord?id=CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.5-0
CVE-2017-17740
LOW
2.5.13+dfsg-5
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2017-17740
https://www.cve.org/CVERecord?id=CVE-2017-17740
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.5-0
CVE-2020-15719
LOW
2.5.13+dfsg-5
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2020-15719
https://www.cve.org/CVERecord?id=CVE-2020-15719
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-2.5-0
CVE-2026-22185
LOW
2.5.13+dfsg-5
https://access.redhat.com/security/cve/CVE-2026-22185
https://bugs.openldap.org/show_bug.cgi?id=10421
https://nvd.nist.gov/vuln/detail/CVE-2026-22185
https://seclists.org/fulldisclosure/2026/Jan/5
https://seclists.org/fulldisclosure/2026/Jan/8
https://www.cve.org/CVERecord?id=CVE-2026-22185
https://www.openldap.org/
https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline
libldap-common
CVE-2023-2953
HIGH
2.5.13+dfsg-5
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2024:4264
https://access.redhat.com/security/cve/CVE-2023-2953
https://bugs.openldap.org/show_bug.cgi?id=9904
https://bugzilla.redhat.com/2210651
https://bugzilla.redhat.com/show_bug.cgi?id=2210651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953
https://errata.almalinux.org/8/ALSA-2024-4264.html
https://errata.rockylinux.org/RLSA-2024:4264
https://linux.oracle.com/cve/CVE-2023-2953.html
https://linux.oracle.com/errata/ELSA-2024-4264.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2953
https://security.netapp.com/advisory/ntap-20230703-0005/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6197-1
https://ubuntu.com/security/notices/USN-6616-1
https://www.cve.org/CVERecord?id=CVE-2023-2953
libldap-common
CVE-2015-3276
LOW
2.5.13+dfsg-5
http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
https://www.cve.org/CVERecord?id=CVE-2015-3276
libldap-common
CVE-2017-14159
LOW
2.5.13+dfsg-5
http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://nvd.nist.gov/vuln/detail/CVE-2017-14159
https://www.cve.org/CVERecord?id=CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common
CVE-2017-17740
LOW
2.5.13+dfsg-5
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2017-17740
https://www.cve.org/CVERecord?id=CVE-2017-17740
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common
CVE-2020-15719
LOW
2.5.13+dfsg-5
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2020-15719
https://www.cve.org/CVERecord?id=CVE-2020-15719
https://www.oracle.com/security-alerts/cpuapr2022.html
libldap-common
CVE-2026-22185
LOW
2.5.13+dfsg-5
https://access.redhat.com/security/cve/CVE-2026-22185
https://bugs.openldap.org/show_bug.cgi?id=10421
https://nvd.nist.gov/vuln/detail/CVE-2026-22185
https://seclists.org/fulldisclosure/2026/Jan/5
https://seclists.org/fulldisclosure/2026/Jan/8
https://www.cve.org/CVERecord?id=CVE-2026-22185
https://www.openldap.org/
https://www.vulncheck.com/advisories/openldap-lmdb-mdb-load-heap-buffer-underflow-in-readline
libmount1
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
libmount1
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
libncursesw6
CVE-2023-50495
MEDIUM
6.4-4
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
libncursesw6
CVE-2025-6141
LOW
6.4-4
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
libnss-systemd
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
libnss-systemd
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
libnss-systemd
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
libnss-systemd
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
libnss3
CVE-2023-5388
MEDIUM
2:3.87.1-1+deb12u1
https://access.redhat.com/errata/RHSA-2024:1494
https://access.redhat.com/security/cve/CVE-2023-5388
https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
https://bugzilla.redhat.com/2243644
https://bugzilla.redhat.com/2260012
https://bugzilla.redhat.com/2268171
https://bugzilla.redhat.com/2270660
https://bugzilla.redhat.com/2270661
https://bugzilla.redhat.com/2270663
https://bugzilla.redhat.com/2270664
https://bugzilla.redhat.com/2270665
https://bugzilla.redhat.com/2270666
https://bugzilla.redhat.com/show_bug.cgi?id=2243644
https://bugzilla.redhat.com/show_bug.cgi?id=2260012
https://bugzilla.redhat.com/show_bug.cgi?id=2268171
https://bugzilla.redhat.com/show_bug.cgi?id=2270660
https://bugzilla.redhat.com/show_bug.cgi?id=2270661
https://bugzilla.redhat.com/show_bug.cgi?id=2270663
https://bugzilla.redhat.com/show_bug.cgi?id=2270664
https://bugzilla.redhat.com/show_bug.cgi?id=2270665
https://bugzilla.redhat.com/show_bug.cgi?id=2270666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
https://errata.almalinux.org/8/ALSA-2024-1494.html
https://errata.rockylinux.org/RLSA-2024:1494
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90_2.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
https://linux.oracle.com/cve/CVE-2023-5388.html
https://linux.oracle.com/errata/ELSA-2024-1498.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5388
https://people.redhat.com/~hkario/marvin/
https://ubuntu.com/security/notices/USN-6703-1
https://ubuntu.com/security/notices/USN-6717-1
https://ubuntu.com/security/notices/USN-6727-1
https://www.cve.org/CVERecord?id=CVE-2023-5388
https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2023-5388
https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2023-5388
https://www.mozilla.org/security/advisories/mfsa2024-12/
https://www.mozilla.org/security/advisories/mfsa2024-13/
https://www.mozilla.org/security/advisories/mfsa2024-14/
libnss3
CVE-2023-6135
MEDIUM
2:3.87.1-1+deb12u1
https://access.redhat.com/errata/RHSA-2024:0786
https://access.redhat.com/security/cve/CVE-2023-6135
https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
https://bugzilla.redhat.com/2249906
https://bugzilla.redhat.com/show_bug.cgi?id=2249906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
https://errata.almalinux.org/8/ALSA-2024-0786.html
https://errata.rockylinux.org/RLSA-2024:0786
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
https://linux.oracle.com/cve/CVE-2023-6135.html
https://linux.oracle.com/errata/ELSA-2024-12337.html
https://minerva.crocs.fi.muni.cz/
https://nvd.nist.gov/vuln/detail/CVE-2023-6135
https://people.redhat.com/~hkario/marvin/
https://security.gentoo.org/glsa/202401-10
https://ubuntu.com/security/notices/USN-6562-1
https://ubuntu.com/security/notices/USN-6727-1
https://www.cve.org/CVERecord?id=CVE-2023-6135
https://www.mozilla.org/en-US/security/advisories/mfsa2023-56/#CVE-2023-6135
https://www.mozilla.org/security/advisories/mfsa2023-56/
libnss3
CVE-2024-7531
MEDIUM
2:3.87.1-1+deb12u1
https://access.redhat.com/security/cve/CVE-2024-7531
https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
https://nvd.nist.gov/vuln/detail/CVE-2024-7531
https://ubuntu.com/security/notices/USN-6966-1
https://www.cve.org/CVERecord?id=CVE-2024-7531
https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/#CVE-2024-7531
https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7531
https://www.mozilla.org/security/advisories/mfsa2024-33/
https://www.mozilla.org/security/advisories/mfsa2024-34/
https://www.mozilla.org/security/advisories/mfsa2024-35/
libnss3
CVE-2017-11695
LOW
2:3.87.1-1+deb12u1
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11695
https://nvd.nist.gov/vuln/detail/CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11695
libnss3
CVE-2017-11696
LOW
2:3.87.1-1+deb12u1
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11696
https://nvd.nist.gov/vuln/detail/CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11696
libnss3
CVE-2017-11697
LOW
2:3.87.1-1+deb12u1
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11697
https://nvd.nist.gov/vuln/detail/CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11697
libnss3
CVE-2017-11698
LOW
2:3.87.1-1+deb12u1
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11698
https://nvd.nist.gov/vuln/detail/CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11698
libpam-modules
CVE-2024-10041
MEDIUM
1.5.2-6+deb12u2
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
libpam-modules-bin
CVE-2024-10041
MEDIUM
1.5.2-6+deb12u2
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
libpam-runtime
CVE-2024-10041
MEDIUM
1.5.2-6+deb12u2
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
libpam-systemd
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
libpam-systemd
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
libpam-systemd
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
libpam-systemd
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
libpam0g
CVE-2024-10041
MEDIUM
1.5.2-6+deb12u2
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
libpixman-1-0
CVE-2023-37769
LOW
0.42.2-1
https://gitlab.freedesktop.org/pixman/pixman/-/issues/76
https://www.cve.org/CVERecord?id=CVE-2023-37769
libpng16-16
CVE-2026-22695
HIGH
1.6.39-2+deb12u1
https://access.redhat.com/security/cve/CVE-2026-22695
https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea
https://github.com/pnggroup/libpng/commit/e4f7ad4ea2
https://github.com/pnggroup/libpng/issues/778
https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp
https://nvd.nist.gov/vuln/detail/CVE-2026-22695
https://ubuntu.com/security/notices/USN-7963-1
https://www.cve.org/CVERecord?id=CVE-2026-22695
https://www.openwall.com/lists/oss-security/2026/01/12/7
libpng16-16
CVE-2026-22801
HIGH
1.6.39-2+deb12u1
https://access.redhat.com/security/cve/CVE-2026-22801
https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8
https://nvd.nist.gov/vuln/detail/CVE-2026-22801
https://ubuntu.com/security/notices/USN-7963-1
https://www.cve.org/CVERecord?id=CVE-2026-22801
https://www.openwall.com/lists/oss-security/2026/01/12/7
libpng16-16
CVE-2021-4214
LOW
1.6.39-2+deb12u1
https://access.redhat.com/security/cve/CVE-2021-4214
https://bugzilla.redhat.com/show_bug.cgi?id=2043393
https://github.com/glennrp/libpng/issues/302
https://nvd.nist.gov/vuln/detail/CVE-2021-4214
https://security-tracker.debian.org/tracker/CVE-2021-4214
https://security.netapp.com/advisory/ntap-20221020-0001/
https://www.cve.org/CVERecord?id=CVE-2021-4214
libpng16-16
CVE-2025-28162
LOW
1.6.39-2+deb12u1
https://access.redhat.com/security/cve/CVE-2025-28162
https://gist.github.com/kittener/fbfdb9b5610c6b3db0d5dea045a07c60
https://github.com/pnggroup/libpng/issues/656
https://github.com/pnggroup/libpng/pull/657
https://nvd.nist.gov/vuln/detail/CVE-2025-28162
https://ubuntu.com/security/notices/USN-7993-1
https://www.cve.org/CVERecord?id=CVE-2025-28162
libpng16-16
CVE-2025-28164
LOW
1.6.39-2+deb12u1
https://access.redhat.com/security/cve/CVE-2025-28164
https://gist.github.com/kittener/506516f8c22178005b4379c8b2a7de20
https://github.com/pnggroup/libpng/issues/655
https://github.com/pnggroup/libpng/pull/657
https://nvd.nist.gov/vuln/detail/CVE-2025-28164
https://ubuntu.com/security/notices/USN-7993-1
https://www.cve.org/CVERecord?id=CVE-2025-28164
libproc2-0
CVE-2023-4016
LOW
2:4.0.2-3
https://access.redhat.com/errata/RHSA-2023:7187
https://access.redhat.com/security/cve/CVE-2023-4016
https://bugzilla.redhat.com/2228494
https://bugzilla.redhat.com/show_bug.cgi?id=2228494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016
https://errata.almalinux.org/8/ALSA-2023-7187.html
https://errata.rockylinux.org/RLSA-2023:7187
https://gitlab.com/procps-ng/procps
https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413
https://gitlab.com/procps-ng/procps/-/issues/297
https://linux.oracle.com/cve/CVE-2023-4016.html
https://linux.oracle.com/errata/ELSA-2023-7187.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
https://nvd.nist.gov/vuln/detail/CVE-2023-4016
https://ubuntu.com/security/notices/USN-6477-1
https://www.cve.org/CVERecord?id=CVE-2023-4016
https://www.freelists.org/post/procps/ps-buffer-overflow-CVE-20234016
libsmartcols1
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
libsmartcols1
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
libsqlite3-0
CVE-2025-7458
CRITICAL
3.40.1-2+deb12u2
https://access.redhat.com/security/cve/CVE-2025-7458
https://nvd.nist.gov/vuln/detail/CVE-2025-7458
https://sqlite.org/forum/forumpost/16ce2bb7a639e29b
https://sqlite.org/src/info/12ad822d9b827777
https://www.cve.org/CVERecord?id=CVE-2025-7458
libsqlite3-0
CVE-2025-7709
MEDIUM
3.40.1-2+deb12u2
http://www.openwall.com/lists/oss-security/2025/09/06/2
http://www.openwall.com/lists/oss-security/2025/11/18/10
https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g
https://ubuntu.com/security/notices/USN-7751-1
https://www.cve.org/CVERecord?id=CVE-2025-7709
libsqlite3-0
CVE-2021-45346
LOW
3.40.1-2+deb12u2
https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://nvd.nist.gov/vuln/detail/CVE-2021-45346
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/056d557c2f8c452ed5
https://sqlite.org/forum/forumpost/53de8864ba114bf6
https://www.cve.org/CVERecord?id=CVE-2021-45346
https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves
libsqlite3-0
CVE-2025-29088
LOW
3.40.1-2+deb12u2
https://access.redhat.com/security/cve/CVE-2025-29088
https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248
https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4
https://nvd.nist.gov/vuln/detail/CVE-2025-29088
https://sqlite.org/forum/forumpost/48f365daec
https://sqlite.org/releaselog/3_49_1.html
https://ubuntu.com/security/notices/USN-7528-1
https://ubuntu.com/security/notices/USN-7679-1
https://www.cve.org/CVERecord?id=CVE-2025-29088
https://www.sqlite.org/cves.html
libssl3
CVE-2025-27587
LOW
3.0.18-1~deb12u2
https://github.com/openssl/openssl/issues/24253
https://minerva.crocs.fi.muni.cz
libstdc++6
CVE-2022-27943
LOW
12.2.0-14+deb12u1
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
libsystemd-shared
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
libsystemd-shared
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
libsystemd-shared
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
libsystemd-shared
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
libsystemd0
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
libsystemd0
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
libsystemd0
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
libsystemd0
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
libtasn1-6
CVE-2025-13151
MEDIUM
4.19.0-2+deb12u1
http://www.openwall.com/lists/oss-security/2026/01/08/5
https://access.redhat.com/security/cve/CVE-2025-13151
https://gitlab.com/gnutls/libtasn1
https://gitlab.com/gnutls/libtasn1/-/merge_requests/121
https://nvd.nist.gov/vuln/detail/CVE-2025-13151
https://ubuntu.com/security/notices/USN-7954-1
https://www.cve.org/CVERecord?id=CVE-2025-13151
https://www.kb.cert.org/vuls/id/271649
libtinfo6
CVE-2023-50495
MEDIUM
6.4-4
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
libtinfo6
CVE-2025-6141
LOW
6.4-4
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
libudev1
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
libudev1
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
libudev1
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
libudev1
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
libuuid1
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
libuuid1
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
libxml2
CVE-2026-0990
MEDIUM
2.9.14+dfsg-1.3~deb12u5
https://access.redhat.com/security/cve/CVE-2026-0990
https://bugzilla.redhat.com/show_bug.cgi?id=2429959
https://nvd.nist.gov/vuln/detail/CVE-2026-0990
https://ubuntu.com/security/notices/USN-7974-1
https://www.cve.org/CVERecord?id=CVE-2026-0990
libxml2
CVE-2025-8732
LOW
2.9.14+dfsg-1.3~deb12u5
https://access.redhat.com/security/cve/CVE-2025-8732
https://drive.google.com/file/d/1woIeYVcSQB_NwfEhaVnX6MedpWJ_nqWl/view?usp=drive_link
https://gitlab.gnome.org/GNOME/libxml2/-/issues/958
https://gitlab.gnome.org/GNOME/libxml2/-/issues/958#note_2505853
https://nvd.nist.gov/vuln/detail/CVE-2025-8732
https://ubuntu.com/security/notices/USN-7974-1
https://vuldb.com/?ctiid.319228
https://vuldb.com/?id.319228
https://vuldb.com/?submit.622285
https://www.cve.org/CVERecord?id=CVE-2025-8732
libxml2
CVE-2026-0989
LOW
2.9.14+dfsg-1.3~deb12u5
https://access.redhat.com/security/cve/CVE-2026-0989
https://bugzilla.redhat.com/show_bug.cgi?id=2429933
https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/374
https://nvd.nist.gov/vuln/detail/CVE-2026-0989
https://ubuntu.com/security/notices/USN-7974-1
https://www.cve.org/CVERecord?id=CVE-2026-0989
libxml2
CVE-2026-0992
LOW
2.9.14+dfsg-1.3~deb12u5
https://access.redhat.com/security/cve/CVE-2026-0992
https://bugzilla.redhat.com/show_bug.cgi?id=2429975
https://nvd.nist.gov/vuln/detail/CVE-2026-0992
https://ubuntu.com/security/notices/USN-7974-1
https://www.cve.org/CVERecord?id=CVE-2026-0992
libxml2
CVE-2026-1757
LOW
2.9.14+dfsg-1.3~deb12u5
https://access.redhat.com/security/cve/CVE-2026-1757
https://bugzilla.redhat.com/show_bug.cgi?id=2435940
https://nvd.nist.gov/vuln/detail/CVE-2026-1757
https://www.cve.org/CVERecord?id=CVE-2026-1757
login
CVE-2007-5686
LOW
1:4.13+dfsg1-1+deb12u2
http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
login
CVE-2024-56433
LOW
1:4.13+dfsg1-1+deb12u2
https://access.redhat.com/errata/RHSA-2025:20145
https://access.redhat.com/security/cve/CVE-2024-56433
https://bugzilla.redhat.com/2334165
https://bugzilla.redhat.com/show_bug.cgi?id=2334165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433
https://errata.almalinux.org/10/ALSA-2025-20145.html
https://errata.rockylinux.org/RLSA-2025:20559
https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241
https://github.com/shadow-maint/shadow/issues/1157
https://github.com/shadow-maint/shadow/releases/tag/4.4
https://linux.oracle.com/cve/CVE-2024-56433.html
https://linux.oracle.com/errata/ELSA-2025-20559-0.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56433
https://www.cve.org/CVERecord?id=CVE-2024-56433
login
TEMP-0628843-DBAD28
LOW
1:4.13+dfsg1-1+deb12u2
mount
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
mount
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
ncurses-base
CVE-2023-50495
MEDIUM
6.4-4
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
ncurses-base
CVE-2025-6141
LOW
6.4-4
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
ncurses-bin
CVE-2023-50495
MEDIUM
6.4-4
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
ncurses-bin
CVE-2025-6141
LOW
6.4-4
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
openssl
CVE-2025-27587
LOW
3.0.18-1~deb12u2
https://github.com/openssl/openssl/issues/24253
https://minerva.crocs.fi.muni.cz
passwd
CVE-2007-5686
LOW
1:4.13+dfsg1-1+deb12u2
http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
passwd
CVE-2024-56433
LOW
1:4.13+dfsg1-1+deb12u2
https://access.redhat.com/errata/RHSA-2025:20145
https://access.redhat.com/security/cve/CVE-2024-56433
https://bugzilla.redhat.com/2334165
https://bugzilla.redhat.com/show_bug.cgi?id=2334165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433
https://errata.almalinux.org/10/ALSA-2025-20145.html
https://errata.rockylinux.org/RLSA-2025:20559
https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241
https://github.com/shadow-maint/shadow/issues/1157
https://github.com/shadow-maint/shadow/releases/tag/4.4
https://linux.oracle.com/cve/CVE-2024-56433.html
https://linux.oracle.com/errata/ELSA-2025-20559-0.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56433
https://www.cve.org/CVERecord?id=CVE-2024-56433
passwd
TEMP-0628843-DBAD28
LOW
1:4.13+dfsg1-1+deb12u2
perl-base
CVE-2011-4116
LOW
5.36.0-7+deb12u3
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2011-4116
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
https://www.cve.org/CVERecord?id=CVE-2011-4116
perl-base
CVE-2023-31486
LOW
5.36.0-7+deb12u3
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:7174
https://access.redhat.com/security/cve/CVE-2023-31486
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2228392
https://errata.almalinux.org/8/ALSA-2023-7174.html
https://github.com/chansen/p5-http-tiny/pull/153
https://hackeriet.github.io/cpan-http-tiny-overview/
https://linux.oracle.com/cve/CVE-2023-31486.html
https://linux.oracle.com/errata/ELSA-2023-7174.html
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
https://security.netapp.com/advisory/ntap-20241129-0011/
https://www.cve.org/CVERecord?id=CVE-2023-31486
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://www.openwall.com/lists/oss-security/2023/05/03/4
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
procps
CVE-2023-4016
LOW
2:4.0.2-3
https://access.redhat.com/errata/RHSA-2023:7187
https://access.redhat.com/security/cve/CVE-2023-4016
https://bugzilla.redhat.com/2228494
https://bugzilla.redhat.com/show_bug.cgi?id=2228494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016
https://errata.almalinux.org/8/ALSA-2023-7187.html
https://errata.rockylinux.org/RLSA-2023:7187
https://gitlab.com/procps-ng/procps
https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413
https://gitlab.com/procps-ng/procps/-/issues/297
https://linux.oracle.com/cve/CVE-2023-4016.html
https://linux.oracle.com/errata/ELSA-2023-7187.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
https://nvd.nist.gov/vuln/detail/CVE-2023-4016
https://ubuntu.com/security/notices/USN-6477-1
https://www.cve.org/CVERecord?id=CVE-2023-4016
https://www.freelists.org/post/procps/ps-buffer-overflow-CVE-20234016
systemd
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
systemd
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
systemd
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
systemd
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
systemd-sysv
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
systemd-sysv
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
systemd-sysv
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
systemd-sysv
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
systemd-timesyncd
CVE-2013-4392
LOW
252.39-1~deb12u1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
systemd-timesyncd
CVE-2023-31437
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
systemd-timesyncd
CVE-2023-31438
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
systemd-timesyncd
CVE-2023-31439
LOW
252.39-1~deb12u1
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
sysvinit-utils
TEMP-0517018-A83CE6
LOW
3.06-4
tar
CVE-2005-2541
LOW
1.34+dfsg-1.2+deb12u1
http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2005-2541
https://www.cve.org/CVERecord?id=CVE-2005-2541
tar
TEMP-0290435-0B57B5
LOW
1.34+dfsg-1.2+deb12u1
util-linux
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
util-linux
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
util-linux-extra
CVE-2025-14104
MEDIUM
2.38.1-5+deb12u3
https://access.redhat.com/errata/RHSA-2026:1696
https://access.redhat.com/errata/RHSA-2026:1852
https://access.redhat.com/errata/RHSA-2026:1913
https://access.redhat.com/security/cve/CVE-2025-14104
https://bugzilla.redhat.com/2419369
https://bugzilla.redhat.com/show_bug.cgi?id=2419369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104
https://errata.almalinux.org/10/ALSA-2026-1696.html
https://errata.rockylinux.org/RLSA-2026:1913
https://linux.oracle.com/cve/CVE-2025-14104.html
https://linux.oracle.com/errata/ELSA-2026-1913.html
https://nvd.nist.gov/vuln/detail/CVE-2025-14104
https://www.cve.org/CVERecord?id=CVE-2025-14104
util-linux-extra
CVE-2022-0563
LOW
2.38.1-5+deb12u3
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
xdg-user-dirs
CVE-2017-15131
LOW
0.18-1
https://access.redhat.com/errata/RHSA-2018:0842
https://access.redhat.com/security/cve/CVE-2017-15131
https://bugzilla.redhat.com/show_bug.cgi?id=1412762
https://linux.oracle.com/cve/CVE-2017-15131.html
https://linux.oracle.com/errata/ELSA-2018-0842.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-15131
https://www.cve.org/CVERecord?id=CVE-2017-15131
zlib1g
CVE-2023-45853
CRITICAL
1:1.2.13.dfsg-1
http://www.openwall.com/lists/oss-security/2023/10/20/9
http://www.openwall.com/lists/oss-security/2024/01/24/10
https://access.redhat.com/security/cve/CVE-2023-45853
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
https://github.com/madler/zlib/pull/843
https://github.com/smihica/pyminizip
https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45853
https://pypi.org/project/pyminizip/#history
https://security.gentoo.org/glsa/202401-18
https://security.netapp.com/advisory/ntap-20231130-0009
https://security.netapp.com/advisory/ntap-20231130-0009/
https://ubuntu.com/security/notices/USN-7107-1
https://www.cve.org/CVERecord?id=CVE-2023-45853
https://www.winimage.com/zLibDll/minizip.html
No Misconfigurations found
dotnet-core
No Vulnerabilities found
No Misconfigurations found
dotnet-core
No Vulnerabilities found
No Misconfigurations found
dotnet-core
No Vulnerabilities found
No Misconfigurations found