docker.io/debian (debian 13.4)¶ Trivy Image Scan Image: docker.io/debian (debian 13.4) Scan date: 2026-04-01 docker.io/debian (debian 13.4) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.37-2+b8 no fix available bsdutils CVE-2022-0563 LOW 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 bsdutils CVE-2025-14104 LOW 1:2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 bsdutils CVE-2026-3184 LOW 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 coreutils CVE-2017-18018 LOW 9.7-3 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 coreutils CVE-2025-5278 LOW 9.7-3 no fix available http://www.openwall.com/lists/oss-security/2025/05/27/2 http://www.openwall.com/lists/oss-security/2025/05/29/1 http://www.openwall.com/lists/oss-security/2025/05/29/2 https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://security-tracker.debian.org/tracker/CVE-2025-5278 https://www.cve.org/CVERecord?id=CVE-2025-5278 libapt-pkg7.0 CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libblkid1 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libblkid1 CVE-2025-14104 LOW 2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 libblkid1 CVE-2026-3184 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 libc-bin CVE-2026-4046 HIGH 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://www.cve.org/CVERecord?id=CVE-2026-4046 libc-bin CVE-2026-4437 MEDIUM 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://www.cve.org/CVERecord?id=CVE-2026-4437 libc-bin CVE-2026-4438 MEDIUM 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://www.cve.org/CVERecord?id=CVE-2026-4438 libc-bin CVE-2010-4756 LOW 2.41-12+deb13u2 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc-bin CVE-2019-1010023 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc-bin CVE-2019-1010024 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc-bin CVE-2019-1010025 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc-bin CVE-2019-9192 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libc6 CVE-2026-4046 HIGH 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://www.cve.org/CVERecord?id=CVE-2026-4046 libc6 CVE-2026-4437 MEDIUM 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://www.cve.org/CVERecord?id=CVE-2026-4437 libc6 CVE-2026-4438 MEDIUM 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://www.cve.org/CVERecord?id=CVE-2026-4438 libc6 CVE-2010-4756 LOW 2.41-12+deb13u2 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc6 CVE-2018-20796 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc6 CVE-2019-1010022 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc6 CVE-2019-1010023 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc6 CVE-2019-1010024 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc6 CVE-2019-1010025 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc6 CVE-2019-9192 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 liblastlog2-2 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 liblastlog2-2 CVE-2025-14104 LOW 2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 liblastlog2-2 CVE-2026-3184 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 libmount1 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libmount1 CVE-2025-14104 LOW 2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 libmount1 CVE-2026-3184 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 libsmartcols1 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libsmartcols1 CVE-2025-14104 LOW 2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 libsmartcols1 CVE-2026-3184 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 libsqlite3-0 CVE-2021-45346 LOW 3.46.1-7+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2021-45346 https://github.com/guyinatuxedo/sqlite3_record_leaking https://nvd.nist.gov/vuln/detail/CVE-2021-45346 https://security.netapp.com/advisory/ntap-20220303-0001/ https://sqlite.org/forum/forumpost/056d557c2f8c452ed5 https://sqlite.org/forum/forumpost/53de8864ba114bf6 https://www.cve.org/CVERecord?id=CVE-2021-45346 https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves libsqlite3-0 CVE-2025-70873 LOW 3.46.1-7+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2025-70873 https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 https://nvd.nist.gov/vuln/detail/CVE-2025-70873 https://sqlite.org/forum/forumpost/761eac3c82 https://sqlite.org/src/info/3d459f1fb1bd1b5e https://www.cve.org/CVERecord?id=CVE-2025-70873 libssl3t64 CVE-2026-2673 LOW 3.5.5-1~deb13u1 no fix available http://www.openwall.com/lists/oss-security/2026/03/13/3 https://access.redhat.com/security/cve/CVE-2026-2673 https://github.com/openssl/openssl/commit/2157c9d81f7b0bd7dfa25b960e928ec28e8dd63f https://github.com/openssl/openssl/commit/85977e013f32ceb96aa034c0e741adddc1a05e34 https://nvd.nist.gov/vuln/detail/CVE-2026-2673 https://openssl-library.org/news/secadv/20260313.txt https://www.cve.org/CVERecord?id=CVE-2026-2673 libsystemd0 CVE-2026-29111 HIGH 257.9-1~deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2026-29111 https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 https://nvd.nist.gov/vuln/detail/CVE-2026-29111 https://ubuntu.com/security/notices/USN-8119-1 https://ubuntu.com/security/notices/USN-8119-2 https://www.cve.org/CVERecord?id=CVE-2026-29111 libsystemd0 CVE-2026-4105 MEDIUM 257.9-1~deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2026-4105 https://bugzilla.redhat.com/show_bug.cgi?id=2447262 https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862 https://nvd.nist.gov/vuln/detail/CVE-2026-4105 https://www.cve.org/CVERecord?id=CVE-2026-4105 libsystemd0 CVE-2013-4392 LOW 257.9-1~deb13u1 no fix available http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://access.redhat.com/security/cve/CVE-2013-4392 https://bugzilla.redhat.com/show_bug.cgi?id=859060 https://nvd.nist.gov/vuln/detail/CVE-2013-4392 https://www.cve.org/CVERecord?id=CVE-2013-4392 libsystemd0 CVE-2023-31437 LOW 257.9-1~deb13u1 no fix available https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/releases libsystemd0 CVE-2023-31438 LOW 257.9-1~deb13u1 no fix available https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/pull/28886 https://github.com/systemd/systemd/releases libsystemd0 CVE-2023-31439 LOW 257.9-1~deb13u1 no fix available https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/pull/28885 https://github.com/systemd/systemd/releases libtinfo6 CVE-2025-69720 HIGH 6.5+20250216-2 no fix available https://access.redhat.com/errata/RHSA-2026:5913 https://access.redhat.com/security/cve/CVE-2025-69720 https://bugzilla.redhat.com/2449037 https://errata.almalinux.org/10/ALSA-2026-5913.html https://github.com/Cao-Wuhui/CVE-2025-69720 https://invisible-island.net/archives/ncurses/6.5/ https://invisible-island.net/ncurses/ https://linux.oracle.com/cve/CVE-2025-69720.html https://linux.oracle.com/errata/ELSA-2026-5913.html https://marc.info/?l=ncurses-bug&m=176539968328570&w=2 https://marc.info/?l=ncurses-bug&m=176540731801330&w=2 https://marc.info/?l=ncurses-bug&m=176545557728083&w=2 https://nvd.nist.gov/vuln/detail/CVE-2025-69720 https://www.cve.org/CVERecord?id=CVE-2025-69720 35 other vulnerabilities found... No Misconfigurations found