docker.io/cypress/included:latest (debian 13.3)¶ Trivy Image Scan Image: docker.io/cypress/included:latest (debian 13.3) Scan date: 2026-02-04 docker.io/cypress/included:latest (debian 13.3) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.37-2+b7 no fix available bsdutils CVE-2025-14104 MEDIUM 1:2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1696.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 bsdutils CVE-2022-0563 LOW 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 coreutils CVE-2017-18018 LOW 9.7-3 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 coreutils CVE-2025-5278 LOW 9.7-3 no fix available http://www.openwall.com/lists/oss-security/2025/05/27/2 http://www.openwall.com/lists/oss-security/2025/05/29/1 http://www.openwall.com/lists/oss-security/2025/05/29/2 https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://security-tracker.debian.org/tracker/CVE-2025-5278 https://www.cve.org/CVERecord?id=CVE-2025-5278 git CVE-2018-1000021 LOW 1:2.47.3-0+deb13u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://www.cve.org/CVERecord?id=CVE-2018-1000021 git CVE-2022-24975 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git CVE-2024-52005 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/errata/RHSA-2025:8414 https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/2338289 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005 https://errata.almalinux.org/8/ALSA-2025-8414.html https://errata.rockylinux.org/RLSA-2025:7409 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://linux.oracle.com/cve/CVE-2024-52005.html https://linux.oracle.com/errata/ELSA-2025-8414.html https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://lore.kernel.org/git/8570a129-d66a-465a-905e-0a077c69c409@gmail.com/T/#t https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://www.cve.org/CVERecord?id=CVE-2024-52005 git-man CVE-2018-1000021 LOW 1:2.47.3-0+deb13u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://www.cve.org/CVERecord?id=CVE-2018-1000021 git-man CVE-2022-24975 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git-man CVE-2024-52005 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/errata/RHSA-2025:8414 https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/2338289 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005 https://errata.almalinux.org/8/ALSA-2025-8414.html https://errata.rockylinux.org/RLSA-2025:7409 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://linux.oracle.com/cve/CVE-2024-52005.html https://linux.oracle.com/errata/ELSA-2025-8414.html https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://lore.kernel.org/git/8570a129-d66a-465a-905e-0a077c69c409@gmail.com/T/#t https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://www.cve.org/CVERecord?id=CVE-2024-52005 libapt-pkg7.0 CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libasound2-data CVE-2026-25068 MEDIUM 1.2.14-1 no fix available https://access.redhat.com/security/cve/CVE-2026-25068 https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://nvd.nist.gov/vuln/detail/CVE-2026-25068 https://www.cve.org/CVERecord?id=CVE-2026-25068 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow libasound2t64 CVE-2026-25068 MEDIUM 1.2.14-1 no fix available https://access.redhat.com/security/cve/CVE-2026-25068 https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://nvd.nist.gov/vuln/detail/CVE-2026-25068 https://www.cve.org/CVERecord?id=CVE-2026-25068 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow libauthen-sasl-perl CVE-2025-40918 MEDIUM 2.1700-1 no fix available http://www.openwall.com/lists/oss-security/2025/07/16/5 https://access.redhat.com/security/cve/CVE-2025-40918 https://datatracker.ietf.org/doc/html/rfc2831 https://github.com/gbarr/perl-authen-sasl/pull/22 https://metacpan.org/dist/Authen-SASL/source/lib/Authen/SASL/Perl/DIGEST_MD5.pm#L263 https://metacpan.org/release/EHUELS/Authen-SASL-2.1900/changes https://nvd.nist.gov/vuln/detail/CVE-2025-40918 https://security.metacpan.org/patches/A/Authen-SASL/2.1800/CVE-2025-40918-r1.patch https://www.cve.org/CVERecord?id=CVE-2025-40918 libavahi-client3 CVE-2024-52615 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:16441 https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615 https://errata.rockylinux.org/RLSA-2025:11402 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g https://linux.oracle.com/cve/CVE-2024-52615.html https://linux.oracle.com/errata/ELSA-2025-16441.html https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://www.cve.org/CVERecord?id=CVE-2024-52615 libavahi-client3 CVE-2024-52616 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/2326429 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616 https://errata.almalinux.org/9/ALSA-2025-7437.html https://errata.rockylinux.org/RLSA-2025:7437 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm https://linux.oracle.com/cve/CVE-2024-52616.html https://linux.oracle.com/errata/ELSA-2025-7437.html https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://www.cve.org/CVERecord?id=CVE-2024-52616 libavahi-client3 CVE-2025-59529 MEDIUM 0.8-16 no fix available http://www.openwall.com/lists/oss-security/2025/12/19/1 https://access.redhat.com/security/cve/CVE-2025-59529 https://github.com/avahi/avahi/pull/808 https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 libavahi-client3 CVE-2025-68276 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68276 libavahi-client3 CVE-2025-68468 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68468 libavahi-client3 CVE-2025-68471 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68471 libavahi-client3 CVE-2026-24401 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://www.cve.org/CVERecord?id=CVE-2026-24401 libavahi-common-data CVE-2024-52615 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:16441 https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615 https://errata.rockylinux.org/RLSA-2025:11402 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g https://linux.oracle.com/cve/CVE-2024-52615.html https://linux.oracle.com/errata/ELSA-2025-16441.html https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://www.cve.org/CVERecord?id=CVE-2024-52615 libavahi-common-data CVE-2024-52616 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/2326429 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616 https://errata.almalinux.org/9/ALSA-2025-7437.html https://errata.rockylinux.org/RLSA-2025:7437 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm https://linux.oracle.com/cve/CVE-2024-52616.html https://linux.oracle.com/errata/ELSA-2025-7437.html https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://www.cve.org/CVERecord?id=CVE-2024-52616 libavahi-common-data CVE-2025-59529 MEDIUM 0.8-16 no fix available http://www.openwall.com/lists/oss-security/2025/12/19/1 https://access.redhat.com/security/cve/CVE-2025-59529 https://github.com/avahi/avahi/pull/808 https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 libavahi-common-data CVE-2025-68276 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68276 libavahi-common-data CVE-2025-68468 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68468 libavahi-common-data CVE-2025-68471 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68471 libavahi-common-data CVE-2026-24401 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://www.cve.org/CVERecord?id=CVE-2026-24401 libavahi-common3 CVE-2024-52615 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:16441 https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615 https://errata.rockylinux.org/RLSA-2025:11402 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g https://linux.oracle.com/cve/CVE-2024-52615.html https://linux.oracle.com/errata/ELSA-2025-16441.html https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://www.cve.org/CVERecord?id=CVE-2024-52615 libavahi-common3 CVE-2024-52616 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/2326429 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616 https://errata.almalinux.org/9/ALSA-2025-7437.html https://errata.rockylinux.org/RLSA-2025:7437 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm https://linux.oracle.com/cve/CVE-2024-52616.html https://linux.oracle.com/errata/ELSA-2025-7437.html https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://www.cve.org/CVERecord?id=CVE-2024-52616 libavahi-common3 CVE-2025-59529 MEDIUM 0.8-16 no fix available http://www.openwall.com/lists/oss-security/2025/12/19/1 https://access.redhat.com/security/cve/CVE-2025-59529 https://github.com/avahi/avahi/pull/808 https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 libavahi-common3 CVE-2025-68276 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68276 libavahi-common3 CVE-2025-68468 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68468 libavahi-common3 CVE-2025-68471 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68471 libavahi-common3 CVE-2026-24401 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://www.cve.org/CVERecord?id=CVE-2026-24401 libavcodec61 CVE-2025-22921 MEDIUM 7:7.1.3-0+deb13u1 no fix available https://lists.debian.org/debian-lts-announce/2025/02/msg00037.html https://trac.ffmpeg.org/ticket/11393 https://ubuntu.com/security/notices/USN-7538-1 https://www.cve.org/CVERecord?id=CVE-2025-22921 libavformat61 CVE-2025-22921 MEDIUM 7:7.1.3-0+deb13u1 no fix available https://lists.debian.org/debian-lts-announce/2025/02/msg00037.html https://trac.ffmpeg.org/ticket/11393 https://ubuntu.com/security/notices/USN-7538-1 https://www.cve.org/CVERecord?id=CVE-2025-22921 libavutil59 CVE-2025-22921 MEDIUM 7:7.1.3-0+deb13u1 no fix available https://lists.debian.org/debian-lts-announce/2025/02/msg00037.html https://trac.ffmpeg.org/ticket/11393 https://ubuntu.com/security/notices/USN-7538-1 https://www.cve.org/CVERecord?id=CVE-2025-22921 libblkid1 CVE-2025-14104 MEDIUM 2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1696.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 libblkid1 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libc-bin CVE-2026-0861 HIGH 2.41-12+deb13u1 no fix available http://www.openwall.com/lists/oss-security/2026/01/16/5 https://access.redhat.com/errata/RHSA-2026:1334 https://access.redhat.com/security/cve/CVE-2026-0861 https://bugzilla.redhat.com/2429771 https://bugzilla.redhat.com/2430201 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915 https://errata.almalinux.org/10/ALSA-2026-1334.html https://errata.rockylinux.org/RLSA-2026:1334 https://linux.oracle.com/cve/CVE-2026-0861.html https://linux.oracle.com/errata/ELSA-2026-50078.html https://nvd.nist.gov/vuln/detail/CVE-2026-0861 https://sourceware.org/bugzilla/show_bug.cgi?id=33796 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001 https://www.cve.org/CVERecord?id=CVE-2026-0861 libc-bin CVE-2025-15281 MEDIUM 2.41-12+deb13u1 no fix available http://www.openwall.com/lists/oss-security/2026/01/20/3 https://access.redhat.com/security/cve/CVE-2025-15281 https://nvd.nist.gov/vuln/detail/CVE-2025-15281 https://sourceware.org/bugzilla/show_bug.cgi?id=33814 https://www.cve.org/CVERecord?id=CVE-2025-15281 libc-bin CVE-2026-0915 MEDIUM 2.41-12+deb13u1 no fix available http://www.openwall.com/lists/oss-security/2026/01/16/6 https://access.redhat.com/errata/RHSA-2026:1334 https://access.redhat.com/security/cve/CVE-2026-0915 https://bugzilla.redhat.com/2429771 https://bugzilla.redhat.com/2430201 https://bugzilla.redhat.com/show_bug.cgi?id=2429771 https://bugzilla.redhat.com/show_bug.cgi?id=2430201 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915 https://errata.almalinux.org/10/ALSA-2026-1334.html https://errata.rockylinux.org/RLSA-2026:1334 https://linux.oracle.com/cve/CVE-2026-0915.html https://linux.oracle.com/errata/ELSA-2026-50078.html https://nvd.nist.gov/vuln/detail/CVE-2026-0915 https://sourceware.org/bugzilla/show_bug.cgi?id=33802 https://www.cve.org/CVERecord?id=CVE-2026-0915 libc-bin CVE-2010-4756 LOW 2.41-12+deb13u1 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.41-12+deb13u1 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.41-12+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc-bin CVE-2019-1010023 LOW 2.41-12+deb13u1 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc-bin CVE-2019-1010024 LOW 2.41-12+deb13u1 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 238 other vulnerabilities found... No Misconfigurations found Node.js (node-pkg)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links ansi-regex CVE-2021-3807 HIGH 3.0.0 6.0.1, 5.0.1, 4.1.1, 3.0.1 https://access.redhat.com/security/cve/CVE-2021-3807 https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908 https://bugzilla.redhat.com/show_bug.cgi?id=1907444 https://bugzilla.redhat.com/show_bug.cgi?id=1945459 https://bugzilla.redhat.com/show_bug.cgi?id=1964461 https://bugzilla.redhat.com/show_bug.cgi?id=2007557 https://bugzilla.redhat.com/show_bug.cgi?id=2098556 https://bugzilla.redhat.com/show_bug.cgi?id=2102001 https://bugzilla.redhat.com/show_bug.cgi?id=2105422 https://bugzilla.redhat.com/show_bug.cgi?id=2105426 https://bugzilla.redhat.com/show_bug.cgi?id=2105428 https://bugzilla.redhat.com/show_bug.cgi?id=2105430 https://bugzilla.redhat.com/show_bug.cgi?id=2121019 https://bugzilla.redhat.com/show_bug.cgi?id=2124299 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987 https://errata.almalinux.org/8/ALSA-2022-0350.html https://errata.rockylinux.org/RLSA-2022:6595 https://github.com/chalk/ansi-regex https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1 https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8 https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311 https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774 https://github.com/chalk/ansi-regex/releases/tag/v6.0.1 https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 https://linux.oracle.com/cve/CVE-2021-3807.html https://linux.oracle.com/errata/ELSA-2022-6595.html https://nvd.nist.gov/vuln/detail/CVE-2021-3807 https://security.netapp.com/advisory/ntap-20221014-0002 https://security.netapp.com/advisory/ntap-20221014-0002/ https://www.cve.org/CVERecord?id=CVE-2021-3807 https://www.oracle.com/security-alerts/cpuapr2022.html axios CVE-2025-58754 HIGH 1.11.0 1.12.0, 0.30.2 https://access.redhat.com/security/cve/CVE-2025-58754 https://github.com/axios/axios https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593 https://github.com/axios/axios/commit/a1b1d3f073a988601583a604f5f9f5d05a3d0b67 https://github.com/axios/axios/commit/c30252f685e8f4326722de84923fcbc8cf557f06 https://github.com/axios/axios/pull/7011 https://github.com/axios/axios/pull/7034 https://github.com/axios/axios/releases/tag/v0.30.2 https://github.com/axios/axios/releases/tag/v1.12.0 https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj https://nvd.nist.gov/vuln/detail/CVE-2025-58754 https://www.cve.org/CVERecord?id=CVE-2025-58754 axios CVE-2025-58754 HIGH 1.11.0 1.12.0, 0.30.2 https://access.redhat.com/security/cve/CVE-2025-58754 https://github.com/axios/axios https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593 https://github.com/axios/axios/commit/a1b1d3f073a988601583a604f5f9f5d05a3d0b67 https://github.com/axios/axios/commit/c30252f685e8f4326722de84923fcbc8cf557f06 https://github.com/axios/axios/pull/7011 https://github.com/axios/axios/pull/7034 https://github.com/axios/axios/releases/tag/v0.30.2 https://github.com/axios/axios/releases/tag/v1.12.0 https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj https://nvd.nist.gov/vuln/detail/CVE-2025-58754 https://www.cve.org/CVERecord?id=CVE-2025-58754 braces CVE-2024-4068 HIGH 2.3.2 3.0.3 https://access.redhat.com/security/cve/CVE-2024-4068 https://devhub.checkmarx.com/cve-details/CVE-2024-4068 https://devhub.checkmarx.com/cve-details/CVE-2024-4068/ https://github.com/micromatch/braces https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308 https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff https://github.com/micromatch/braces/issues/35 https://github.com/micromatch/braces/pull/37 https://github.com/micromatch/braces/pull/40 https://nvd.nist.gov/vuln/detail/CVE-2024-4068 https://www.cve.org/CVERecord?id=CVE-2024-4068 cookie CVE-2024-47764 LOW 0.4.0 0.7.0 https://access.redhat.com/security/cve/CVE-2024-47764 https://github.com/jshttp/cookie https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c https://github.com/jshttp/cookie/pull/167 https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x https://nvd.nist.gov/vuln/detail/CVE-2024-47764 https://www.cve.org/CVERecord?id=CVE-2024-47764 cookie CVE-2024-47764 LOW 0.4.2 0.7.0 https://access.redhat.com/security/cve/CVE-2024-47764 https://github.com/jshttp/cookie https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c https://github.com/jshttp/cookie/pull/167 https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x https://nvd.nist.gov/vuln/detail/CVE-2024-47764 https://www.cve.org/CVERecord?id=CVE-2024-47764 debug CVE-2017-16137 LOW 3.2.6 2.6.9, 3.1.0, 3.2.7, 4.3.1 https://access.redhat.com/security/cve/CVE-2017-16137 https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020 https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290 https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5ac https://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5a https://github.com/debug-js/debug/issues/797 https://github.com/visionmedia/debug https://github.com/visionmedia/debug/issues/501 https://github.com/visionmedia/debug/pull/504 https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3E https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3E https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E https://nodesecurity.io/advisories/534 https://nvd.nist.gov/vuln/detail/CVE-2017-16137 https://www.cve.org/CVERecord?id=CVE-2017-16137 diff CVE-2026-24001 LOW 3.5.0 8.0.3, 5.2.2, 4.0.4, 3.5.1 https://access.redhat.com/security/cve/CVE-2026-24001 https://github.com/kpdecker/jsdiff https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5 https://github.com/kpdecker/jsdiff/issues/653 https://github.com/kpdecker/jsdiff/pull/649 https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx https://nvd.nist.gov/vuln/detail/CVE-2026-24001 https://www.cve.org/CVERecord?id=CVE-2026-24001 diff CVE-2026-24001 LOW 4.0.2 8.0.3, 5.2.2, 4.0.4, 3.5.1 https://access.redhat.com/security/cve/CVE-2026-24001 https://github.com/kpdecker/jsdiff https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5 https://github.com/kpdecker/jsdiff/issues/653 https://github.com/kpdecker/jsdiff/pull/649 https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx https://nvd.nist.gov/vuln/detail/CVE-2026-24001 https://www.cve.org/CVERecord?id=CVE-2026-24001 diff CVE-2026-24001 LOW 8.0.2 8.0.3, 5.2.2, 4.0.4, 3.5.1 https://access.redhat.com/security/cve/CVE-2026-24001 https://github.com/kpdecker/jsdiff https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5 https://github.com/kpdecker/jsdiff/issues/653 https://github.com/kpdecker/jsdiff/pull/649 https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx https://nvd.nist.gov/vuln/detail/CVE-2026-24001 https://www.cve.org/CVERecord?id=CVE-2026-24001 engine.io CVE-2022-21676 HIGH 5.0.0 4.1.2, 5.2.1, 6.1.1 https://github.com/socketio/engine.io https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c https://github.com/socketio/engine.io/releases/tag/4.1.2 https://github.com/socketio/engine.io/releases/tag/5.2.1 https://github.com/socketio/engine.io/releases/tag/6.1.1 https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f https://nvd.nist.gov/vuln/detail/CVE-2022-21676 https://security.netapp.com/advisory/ntap-20220209-0002 https://security.netapp.com/advisory/ntap-20220209-0002/ engine.io CVE-2022-21676 HIGH 5.0.0 4.1.2, 5.2.1, 6.1.1 https://github.com/socketio/engine.io https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c https://github.com/socketio/engine.io/releases/tag/4.1.2 https://github.com/socketio/engine.io/releases/tag/5.2.1 https://github.com/socketio/engine.io/releases/tag/6.1.1 https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f https://nvd.nist.gov/vuln/detail/CVE-2022-21676 https://security.netapp.com/advisory/ntap-20220209-0002 https://security.netapp.com/advisory/ntap-20220209-0002/ engine.io CVE-2022-41940 MEDIUM 5.0.0 3.6.1, 6.2.1 https://access.redhat.com/security/cve/CVE-2022-41940 https://github.com/socketio/engine.io https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6 https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085 https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w https://nvd.nist.gov/vuln/detail/CVE-2022-41940 https://www.cve.org/CVERecord?id=CVE-2022-41940 engine.io CVE-2022-41940 MEDIUM 5.0.0 3.6.1, 6.2.1 https://access.redhat.com/security/cve/CVE-2022-41940 https://github.com/socketio/engine.io https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6 https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085 https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w https://nvd.nist.gov/vuln/detail/CVE-2022-41940 https://www.cve.org/CVERecord?id=CVE-2022-41940 fast-xml-parser CVE-2026-25128 HIGH 4.5.3 5.3.4 https://access.redhat.com/security/cve/CVE-2026-25128 https://github.com/NaturalIntelligence/fast-xml-parser https://github.com/NaturalIntelligence/fast-xml-parser/commit/4e387f61c4a5cef792f6a2f42467013290bf95dc https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.3.4 https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-37qj-frw5-hhjh https://nvd.nist.gov/vuln/detail/CVE-2026-25128 https://www.cve.org/CVERecord?id=CVE-2026-25128 glob CVE-2025-64756 HIGH 10.4.5 11.1.0, 10.5.0 https://access.redhat.com/security/cve/CVE-2025-64756 https://github.com/isaacs/node-glob https://github.com/isaacs/node-glob/commit/1e4e297342a09f2aa0ced87fcd4a70ddc325d75f https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146 https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2 https://nvd.nist.gov/vuln/detail/CVE-2025-64756 https://www.cve.org/CVERecord?id=CVE-2025-64756 glob CVE-2025-64756 HIGH 11.0.3 11.1.0, 10.5.0 https://access.redhat.com/security/cve/CVE-2025-64756 https://github.com/isaacs/node-glob https://github.com/isaacs/node-glob/commit/1e4e297342a09f2aa0ced87fcd4a70ddc325d75f https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146 https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2 https://nvd.nist.gov/vuln/detail/CVE-2025-64756 https://www.cve.org/CVERecord?id=CVE-2025-64756 got CVE-2022-33987 MEDIUM 8.3.2 12.1.0, 11.8.5 https://access.redhat.com/errata/RHSA-2022:6448 https://access.redhat.com/security/cve/CVE-2022-33987 https://bugzilla.redhat.com/2102001 https://bugzilla.redhat.com/2105422 https://bugzilla.redhat.com/2105426 https://bugzilla.redhat.com/2105428 https://bugzilla.redhat.com/2105430 https://bugzilla.redhat.com/show_bug.cgi?id=1907444 https://bugzilla.redhat.com/show_bug.cgi?id=1945459 https://bugzilla.redhat.com/show_bug.cgi?id=1964461 https://bugzilla.redhat.com/show_bug.cgi?id=2007557 https://bugzilla.redhat.com/show_bug.cgi?id=2098556 https://bugzilla.redhat.com/show_bug.cgi?id=2102001 https://bugzilla.redhat.com/show_bug.cgi?id=2105422 https://bugzilla.redhat.com/show_bug.cgi?id=2105426 https://bugzilla.redhat.com/show_bug.cgi?id=2105428 https://bugzilla.redhat.com/show_bug.cgi?id=2105430 https://bugzilla.redhat.com/show_bug.cgi?id=2121019 https://bugzilla.redhat.com/show_bug.cgi?id=2124299 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987 https://errata.almalinux.org/8/ALSA-2022-6448.html https://errata.rockylinux.org/RLSA-2022:6595 https://github.com/sindresorhus/got https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0 https://github.com/sindresorhus/got/pull/2047 https://github.com/sindresorhus/got/releases/tag/v11.8.5 https://github.com/sindresorhus/got/releases/tag/v12.1.0 https://linux.oracle.com/cve/CVE-2022-33987.html https://linux.oracle.com/errata/ELSA-2022-6595.html https://nvd.nist.gov/vuln/detail/CVE-2022-33987 https://www.cve.org/CVERecord?id=CVE-2022-33987 hosted-git-info CVE-2021-23362 MEDIUM 2.8.8 2.8.9, 3.0.8 https://access.redhat.com/security/cve/CVE-2021-23362 https://bugzilla.redhat.com/show_bug.cgi?id=1941471 https://bugzilla.redhat.com/show_bug.cgi?id=1943208 https://bugzilla.redhat.com/show_bug.cgi?id=1979338 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290 https://errata.almalinux.org/8/ALSA-2021-3074.html https://errata.rockylinux.org/RLSA-2021:3074 https://github.com/npm/hosted-git-info https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7 https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01 https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3 https://github.com/npm/hosted-git-info/commits/v2 https://github.com/npm/hosted-git-info/pull/76 https://linux.oracle.com/cve/CVE-2021-23362.html https://linux.oracle.com/errata/ELSA-2021-3074.html https://nvd.nist.gov/vuln/detail/CVE-2021-23362 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356 https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355 https://ubuntu.com/security/notices/USN-5216-1 https://www.cve.org/CVERecord?id=CVE-2021-23362 http-cache-semantics CVE-2022-25881 HIGH 3.8.1 4.1.1 https://access.redhat.com/errata/RHSA-2023:1743 https://access.redhat.com/security/cve/CVE-2022-25881 https://bugzilla.redhat.com/2134609 https://bugzilla.redhat.com/2156324 https://bugzilla.redhat.com/2165824 https://bugzilla.redhat.com/2168631 https://bugzilla.redhat.com/2170644 https://bugzilla.redhat.com/2171935 https://bugzilla.redhat.com/2172217 https://bugzilla.redhat.com/show_bug.cgi?id=2165824 https://bugzilla.redhat.com/show_bug.cgi?id=2168631 https://bugzilla.redhat.com/show_bug.cgi?id=2171935 https://bugzilla.redhat.com/show_bug.cgi?id=2172190 https://bugzilla.redhat.com/show_bug.cgi?id=2172204 https://bugzilla.redhat.com/show_bug.cgi?id=2172217 https://bugzilla.redhat.com/show_bug.cgi?id=2178076 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807 https://errata.almalinux.org/8/ALSA-2023-1743.html https://errata.rockylinux.org/RLSA-2023:2655 https://github.com/kornelski/http-cache-semantics https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83 https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74 https://linux.oracle.com/cve/CVE-2022-25881.html https://linux.oracle.com/errata/ELSA-2023-2655.html https://nvd.nist.gov/vuln/detail/CVE-2022-25881 https://security.netapp.com/advisory/ntap-20230622-0008 https://security.netapp.com/advisory/ntap-20230622-0008/ https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332 https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 https://www.cve.org/CVERecord?id=CVE-2022-25881 js-yaml CVE-2025-64718 MEDIUM 3.13.1 4.1.1, 3.14.2 https://access.redhat.com/security/cve/CVE-2025-64718 https://github.com/advisories/GHSA-mh29-5h37-fv8m https://github.com/nodeca/js-yaml https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879 https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266 https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876 https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m https://nvd.nist.gov/vuln/detail/CVE-2025-64718 https://www.cve.org/CVERecord?id=CVE-2025-64718 js-yaml CVE-2025-64718 MEDIUM 3.14.1 4.1.1, 3.14.2 https://access.redhat.com/security/cve/CVE-2025-64718 https://github.com/advisories/GHSA-mh29-5h37-fv8m https://github.com/nodeca/js-yaml https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879 https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266 https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876 https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m https://nvd.nist.gov/vuln/detail/CVE-2025-64718 https://www.cve.org/CVERecord?id=CVE-2025-64718 micromatch CVE-2024-4067 MEDIUM 3.1.10 4.0.8 https://access.redhat.com/security/cve/CVE-2024-4067 https://advisory.checkmarx.net/advisory/CVE-2024-4067 https://advisory.checkmarx.net/advisory/CVE-2024-4067/ https://devhub.checkmarx.com/cve-details/CVE-2024-4067 https://devhub.checkmarx.com/cve-details/CVE-2024-4067/ https://github.com/micromatch/micromatch https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448 https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade https://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0 https://github.com/micromatch/micromatch/issues/243 https://github.com/micromatch/micromatch/pull/247 https://github.com/micromatch/micromatch/pull/266 https://github.com/micromatch/micromatch/releases/tag/4.0.8 https://nvd.nist.gov/vuln/detail/CVE-2024-4067 https://www.cve.org/CVERecord?id=CVE-2024-4067 min-document CVE-2025-57352 LOW 2.19.0 2.19.1 https://access.redhat.com/security/cve/CVE-2025-57352 https://github.com/Raynos/min-document https://github.com/Raynos/min-document/commit/fe32e8da464cef622528725f647029a8fd7d95a6 https://github.com/Raynos/min-document/issues/54 https://github.com/Raynos/min-document/pull/55 https://github.com/VulnSageAgent/PoCs/tree/main/JavaScript/prototype-pollution/CVE-2025-57352 https://nvd.nist.gov/vuln/detail/CVE-2025-57352 https://www.cve.org/CVERecord?id=CVE-2025-57352 minimatch CVE-2022-3517 HIGH 3.0.4 3.0.5 https://access.redhat.com/errata/RHSA-2023:1743 https://access.redhat.com/security/cve/CVE-2022-3517 https://bugzilla.redhat.com/2134609 https://bugzilla.redhat.com/2156324 https://bugzilla.redhat.com/2165824 https://bugzilla.redhat.com/2168631 https://bugzilla.redhat.com/2170644 https://bugzilla.redhat.com/2171935 https://bugzilla.redhat.com/2172217 https://bugzilla.redhat.com/show_bug.cgi?id=2066009 https://bugzilla.redhat.com/show_bug.cgi?id=2130518 https://bugzilla.redhat.com/show_bug.cgi?id=2134609 https://bugzilla.redhat.com/show_bug.cgi?id=2140911 https://bugzilla.redhat.com/show_bug.cgi?id=2142808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548 https://errata.almalinux.org/8/ALSA-2023-1743.html https://errata.rockylinux.org/RLSA-2023:0321 https://github.com/grafana/grafana-image-renderer/issues/329 https://github.com/isaacs/minimatch https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6 https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6 (v3.0.5) https://github.com/nodejs/node/issues/42510 https://linux.oracle.com/cve/CVE-2022-3517.html https://linux.oracle.com/errata/ELSA-2023-1743.html https://lists.debian.org/debian-lts-announce/2023/01/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK https://nvd.nist.gov/vuln/detail/CVE-2022-3517 https://ubuntu.com/security/notices/USN-6086-1 https://www.cve.org/CVERecord?id=CVE-2022-3517 on-headers CVE-2025-7339 LOW 1.0.2 1.1.0 https://access.redhat.com/security/cve/CVE-2025-7339 https://cna.openjsf.org/security-advisories.html https://github.com/expressjs/morgan/issues/315 https://github.com/jshttp/on-headers https://github.com/jshttp/on-headers/commit/c6e384908c9c6127d18831d16ab0bd96e1231867 https://github.com/jshttp/on-headers/issues/15 https://github.com/jshttp/on-headers/security/advisories/GHSA-76c9-3jph-rj3q https://nvd.nist.gov/vuln/detail/CVE-2025-7339 https://www.cve.org/CVERecord?id=CVE-2025-7339 parseuri CVE-2024-36751 MEDIUM 0.0.6 2.0.0 https://gist.github.com/6en6ar/78168687da94e8aa2e0357f2456b0233 https://github.com/Kikobeats/parse-uri/issues/14 https://nvd.nist.gov/vuln/detail/CVE-2024-36751 phin GHSA-x565-32qp-m3vf MEDIUM 2.9.3 3.7.1 https://github.com/ethanent/phin https://github.com/ethanent/phin/commit/c071f95336a987dad9332fd388adeb249925cc57 https://github.com/ethanent/phin/security/advisories/GHSA-x565-32qp-m3vf socket.io-parser CVE-2023-32695 MEDIUM 4.0.5 4.2.3, 3.4.3, 3.3.4 https://github.com/socketio/socket.io-parser https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9 https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3 https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4 https://github.com/socketio/socket.io-parser/releases/tag/4.2.3 https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9 https://nvd.nist.gov/vuln/detail/CVE-2023-32695 socket.io-parser CVE-2023-32695 MEDIUM 4.0.5 4.2.3, 3.4.3, 3.3.4 https://github.com/socketio/socket.io-parser https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9 https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3 https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4 https://github.com/socketio/socket.io-parser/releases/tag/4.2.3 https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9 https://nvd.nist.gov/vuln/detail/CVE-2023-32695 socket.io-parser CVE-2023-32695 MEDIUM 4.0.5 4.2.3, 3.4.3, 3.3.4 https://github.com/socketio/socket.io-parser https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9 https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3 https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4 https://github.com/socketio/socket.io-parser/releases/tag/4.2.3 https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9 https://nvd.nist.gov/vuln/detail/CVE-2023-32695 squirrelly CVE-2021-32819 HIGH 7.9.2 9.0.0 https://github.com/squirrellyjs/squirrelly https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e https://github.com/squirrellyjs/squirrelly/commit/dca7a1e7ee91d8a6ffffb655f3f15647486db9da https://github.com/squirrellyjs/squirrelly/pull/254 https://nvd.nist.gov/vuln/detail/CVE-2021-32819 https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ tar CVE-2026-23745 HIGH 6.2.1 7.5.3 https://access.redhat.com/security/cve/CVE-2026-23745 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97 https://nvd.nist.gov/vuln/detail/CVE-2026-23745 https://www.cve.org/CVERecord?id=CVE-2026-23745 tar CVE-2026-23950 HIGH 6.2.1 7.5.4 https://access.redhat.com/security/cve/CVE-2026-23950 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6 https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w https://nvd.nist.gov/vuln/detail/CVE-2026-23950 https://www.cve.org/CVERecord?id=CVE-2026-23950 tar CVE-2026-24842 HIGH 6.2.1 7.5.7 https://access.redhat.com/security/cve/CVE-2026-24842 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46 https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v https://nvd.nist.gov/vuln/detail/CVE-2026-24842 https://www.cve.org/CVERecord?id=CVE-2026-24842 tar CVE-2026-23745 HIGH 7.5.1 7.5.3 https://access.redhat.com/security/cve/CVE-2026-23745 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97 https://nvd.nist.gov/vuln/detail/CVE-2026-23745 https://www.cve.org/CVERecord?id=CVE-2026-23745 tar CVE-2026-23950 HIGH 7.5.1 7.5.4 https://access.redhat.com/security/cve/CVE-2026-23950 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6 https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w https://nvd.nist.gov/vuln/detail/CVE-2026-23950 https://www.cve.org/CVERecord?id=CVE-2026-23950 tar CVE-2026-24842 HIGH 7.5.1 7.5.7 https://access.redhat.com/security/cve/CVE-2026-24842 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46 https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v https://nvd.nist.gov/vuln/detail/CVE-2026-24842 https://www.cve.org/CVERecord?id=CVE-2026-24842 tar CVE-2025-64118 MEDIUM 7.5.1 7.5.2 https://access.redhat.com/security/cve/CVE-2025-64118 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d https://github.com/isaacs/node-tar/commit/5e1a8e638600d3c3a2969b4de6a6ec44fa8d74c9 https://github.com/isaacs/node-tar/issues/445 https://github.com/isaacs/node-tar/pull/446 https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph https://nvd.nist.gov/vuln/detail/CVE-2025-64118 https://www.cve.org/CVERecord?id=CVE-2025-64118 tar-fs CVE-2025-59343 HIGH 3.1.0 3.1.1, 2.1.4, 1.16.6 https://access.redhat.com/security/cve/CVE-2025-59343 https://github.com/mafintosh/tar-fs https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09 https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v https://lists.debian.org/debian-lts-announce/2025/09/msg00028.html https://nvd.nist.gov/vuln/detail/CVE-2025-59343 https://www.cve.org/CVERecord?id=CVE-2025-59343 tar-fs CVE-2025-59343 HIGH 3.1.0 3.1.1, 2.1.4, 1.16.6 https://access.redhat.com/security/cve/CVE-2025-59343 https://github.com/mafintosh/tar-fs https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09 https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v https://lists.debian.org/debian-lts-announce/2025/09/msg00028.html https://nvd.nist.gov/vuln/detail/CVE-2025-59343 https://www.cve.org/CVERecord?id=CVE-2025-59343 tar-fs CVE-2025-59343 HIGH 3.1.0 3.1.1, 2.1.4, 1.16.6 https://access.redhat.com/security/cve/CVE-2025-59343 https://github.com/mafintosh/tar-fs https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09 https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v https://lists.debian.org/debian-lts-announce/2025/09/msg00028.html https://nvd.nist.gov/vuln/detail/CVE-2025-59343 https://www.cve.org/CVERecord?id=CVE-2025-59343 undici CVE-2026-22036 MEDIUM 6.21.3 7.18.2, 6.23.0 https://access.redhat.com/security/cve/CVE-2026-22036 https://github.com/nodejs/undici https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3 https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9 https://nvd.nist.gov/vuln/detail/CVE-2026-22036 https://www.cve.org/CVERecord?id=CVE-2026-22036 ws CVE-2024-37890 HIGH 7.4.5 5.2.4, 6.2.3, 7.5.10, 8.17.1 https://access.redhat.com/security/cve/CVE-2024-37890 https://github.com/websockets/ws https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63 https://github.com/websockets/ws/issues/2230 https://github.com/websockets/ws/pull/2231 https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q https://nodejs.org/api/http.html#servermaxheaderscount https://nvd.nist.gov/vuln/detail/CVE-2024-37890 https://www.cve.org/CVERecord?id=CVE-2024-37890 ws CVE-2024-37890 HIGH 7.4.5 5.2.4, 6.2.3, 7.5.10, 8.17.1 https://access.redhat.com/security/cve/CVE-2024-37890 https://github.com/websockets/ws https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63 https://github.com/websockets/ws/issues/2230 https://github.com/websockets/ws/pull/2231 https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q https://nodejs.org/api/http.html#servermaxheaderscount https://nvd.nist.gov/vuln/detail/CVE-2024-37890 https://www.cve.org/CVERecord?id=CVE-2024-37890 ws CVE-2021-32640 MEDIUM 7.4.5 7.4.6, 6.2.2, 5.2.3 https://access.redhat.com/security/cve/CVE-2021-32640 https://github.com/websockets/ws https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff https://github.com/websockets/ws/issues/1895 https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2021-32640 https://security.netapp.com/advisory/ntap-20210706-0005 https://security.netapp.com/advisory/ntap-20210706-0005/ https://www.cve.org/CVERecord?id=CVE-2021-32640 ws CVE-2021-32640 MEDIUM 7.4.5 7.4.6, 6.2.2, 5.2.3 https://access.redhat.com/security/cve/CVE-2021-32640 https://github.com/websockets/ws https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff https://github.com/websockets/ws/issues/1895 https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693 https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30%40%3Ccommits.tinkerpop.apache.org%3E https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2021-32640 https://security.netapp.com/advisory/ntap-20210706-0005 https://security.netapp.com/advisory/ntap-20210706-0005/ https://www.cve.org/CVERecord?id=CVE-2021-32640 ws CVE-2024-37890 HIGH 8.11.0 5.2.4, 6.2.3, 7.5.10, 8.17.1 https://access.redhat.com/security/cve/CVE-2024-37890 https://github.com/websockets/ws https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63 https://github.com/websockets/ws/issues/2230 https://github.com/websockets/ws/pull/2231 https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q https://nodejs.org/api/http.html#servermaxheaderscount https://nvd.nist.gov/vuln/detail/CVE-2024-37890 https://www.cve.org/CVERecord?id=CVE-2024-37890 ws CVE-2024-37890 HIGH 8.11.0 5.2.4, 6.2.3, 7.5.10, 8.17.1 https://access.redhat.com/security/cve/CVE-2024-37890 https://github.com/websockets/ws https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63 https://github.com/websockets/ws/issues/2230 https://github.com/websockets/ws/pull/2231 https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q https://nodejs.org/api/http.html#servermaxheaderscount https://nvd.nist.gov/vuln/detail/CVE-2024-37890 https://www.cve.org/CVERecord?id=CVE-2024-37890 xml2js CVE-2023-0842 MEDIUM 0.4.23 0.5.0 https://access.redhat.com/security/cve/CVE-2023-0842 https://fluidattacks.com/advisories/myers https://fluidattacks.com/advisories/myers/ https://github.com/Leonidas-from-XIV/node-xml2js https://github.com/Leonidas-from-XIV/node-xml2js/ https://github.com/Leonidas-from-XIV/node-xml2js/issues/663 https://github.com/Leonidas-from-XIV/node-xml2js/pull/603/commits/581b19a62d88f8a3c068b5a45f4542c2d6a495a5 https://github.com/Leonidas-from-XIV/node-xml2js/releases/tag/0.6.2 https://github.com/advisories/GHSA-776f-qx25-q3cc https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2023-0842 https://www.cve.org/CVERecord?id=CVE-2023-0842 No Misconfigurations found root/.cache/Cypress/15.10.0/Cypress/resources/app/node_modules/@esbuild/linux-x64/bin/esbuild (gobinary)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links stdlib CVE-2025-58183 HIGH v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/errata/RHSA-2026:1380 https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/2407258 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183 https://errata.almalinux.org/8/ALSA-2026-1380.html https://errata.rockylinux.org/RLSA-2025:23326 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://linux.oracle.com/cve/CVE-2025-58183.html https://linux.oracle.com/errata/ELSA-2026-50076.html https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://pkg.go.dev/vuln/GO-2025-4014 https://www.cve.org/CVERecord?id=CVE-2025-58183 stdlib CVE-2025-61726 HIGH v1.23.12 1.24.12, 1.25.6 https://access.redhat.com/security/cve/CVE-2025-61726 https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://nvd.nist.gov/vuln/detail/CVE-2025-61726 https://pkg.go.dev/vuln/GO-2026-4341 https://www.cve.org/CVERecord?id=CVE-2025-61726 stdlib CVE-2025-61728 HIGH v1.23.12 1.24.12, 1.25.6 http://www.openwall.com/lists/oss-security/2026/01/15/4 https://access.redhat.com/security/cve/CVE-2025-61728 https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://nvd.nist.gov/vuln/detail/CVE-2025-61728 https://pkg.go.dev/vuln/GO-2026-4342 https://www.cve.org/CVERecord?id=CVE-2025-61728 stdlib CVE-2025-61729 HIGH v1.23.12 1.24.11, 1.25.5 https://access.redhat.com/errata/RHSA-2026:1518 https://access.redhat.com/security/cve/CVE-2025-61729 https://bugzilla.redhat.com/2418462 https://bugzilla.redhat.com/show_bug.cgi?id=2418462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729 https://errata.almalinux.org/8/ALSA-2026-1518.html https://errata.rockylinux.org/RLSA-2026:0923 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://linux.oracle.com/cve/CVE-2025-61729.html https://linux.oracle.com/errata/ELSA-2026-1715.html https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://pkg.go.dev/vuln/GO-2025-4155 https://www.cve.org/CVERecord?id=CVE-2025-61729 stdlib CVE-2025-47912 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-47912 https://go.dev/cl/709857 https://go.dev/issue/75678 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-47912 https://pkg.go.dev/vuln/GO-2025-4010 https://www.cve.org/CVERecord?id=CVE-2025-47912 stdlib CVE-2025-58185 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58185 https://github.com/golang/go/commit/8709a41d5ef7321f486a1857f189c3fee20e8edd https://go.dev/cl/709856 https://go.dev/issue/75671 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58185 https://pkg.go.dev/vuln/GO-2025-4011 https://www.cve.org/CVERecord?id=CVE-2025-58185 stdlib CVE-2025-58186 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58186 https://go.dev/cl/709855 https://go.dev/issue/75672 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58186 https://pkg.go.dev/vuln/GO-2025-4012 https://www.cve.org/CVERecord?id=CVE-2025-58186 stdlib CVE-2025-58187 MEDIUM v1.23.12 1.24.9, 1.25.3 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58187 https://github.com/golang/go/commit/3fc4c79fdbb17b9b29ea9f8c29dd780df075d4c4 https://go.dev/cl/709854 https://go.dev/issue/75681 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58187 https://pkg.go.dev/vuln/GO-2025-4007 https://www.cve.org/CVERecord?id=CVE-2025-58187 stdlib CVE-2025-58188 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58188 https://github.com/golang/go/commit/6e4007e8cffbb870e6b606307ab7308236ecefb9 https://go.dev/cl/709853 https://go.dev/issue/75675 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58188 https://pkg.go.dev/vuln/GO-2025-4013 https://www.cve.org/CVERecord?id=CVE-2025-58188 stdlib CVE-2025-58189 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58189 https://go.dev/cl/707776 https://go.dev/issue/75652 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58189 https://pkg.go.dev/vuln/GO-2025-4008 https://www.cve.org/CVERecord?id=CVE-2025-58189 stdlib CVE-2025-61723 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-61723 https://github.com/golang/go/commit/5ce8cd16f3859ec5ac4106ad8ec15d6236f4501b https://go.dev/cl/709858 https://go.dev/issue/75676 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-61723 https://pkg.go.dev/vuln/GO-2025-4009 https://www.cve.org/CVERecord?id=CVE-2025-61723 stdlib CVE-2025-61724 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-61724 https://go.dev/cl/709859 https://go.dev/issue/75716 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-61724 https://pkg.go.dev/vuln/GO-2025-4015 https://www.cve.org/CVERecord?id=CVE-2025-61724 stdlib CVE-2025-61725 MEDIUM v1.23.12 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-61725 https://go.dev/cl/709860 https://go.dev/issue/75680 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-61725 https://pkg.go.dev/vuln/GO-2025-4006 https://www.cve.org/CVERecord?id=CVE-2025-61725 stdlib CVE-2025-61727 MEDIUM v1.23.12 1.24.11, 1.25.5 https://access.redhat.com/security/cve/CVE-2025-61727 https://go.dev/cl/723900 https://go.dev/issue/76442 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://nvd.nist.gov/vuln/detail/CVE-2025-61727 https://pkg.go.dev/vuln/GO-2025-4175 https://www.cve.org/CVERecord?id=CVE-2025-61727 stdlib CVE-2025-61730 MEDIUM v1.23.12 1.24.12, 1.25.6 https://go.dev/cl/724120 https://go.dev/issue/76443 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://nvd.nist.gov/vuln/detail/CVE-2025-61730 https://pkg.go.dev/vuln/GO-2026-4340 No Misconfigurations found