docker.io/cypress/browsers:latest (debian 13.4)¶ Trivy Image Scan Image: docker.io/cypress/browsers:latest (debian 13.4) Scan date: 2026-04-01 docker.io/cypress/browsers:latest (debian 13.4) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.37-2+b8 no fix available bsdutils CVE-2022-0563 LOW 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 bsdutils CVE-2025-14104 LOW 1:2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 bsdutils CVE-2026-3184 LOW 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 coreutils CVE-2017-18018 LOW 9.7-3 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 coreutils CVE-2025-5278 LOW 9.7-3 no fix available http://www.openwall.com/lists/oss-security/2025/05/27/2 http://www.openwall.com/lists/oss-security/2025/05/29/1 http://www.openwall.com/lists/oss-security/2025/05/29/2 https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://security-tracker.debian.org/tracker/CVE-2025-5278 https://www.cve.org/CVERecord?id=CVE-2025-5278 git CVE-2018-1000021 LOW 1:2.47.3-0+deb13u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://www.cve.org/CVERecord?id=CVE-2018-1000021 git CVE-2022-24975 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git CVE-2024-52005 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/errata/RHSA-2025:7409 https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/2338289 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005 https://errata.almalinux.org/9/ALSA-2025-7409.html https://errata.rockylinux.org/RLSA-2025:7409 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://linux.oracle.com/cve/CVE-2024-52005.html https://linux.oracle.com/errata/ELSA-2025-8414.html https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://lore.kernel.org/git/8570a129-d66a-465a-905e-0a077c69c409@gmail.com/T/#t https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://www.cve.org/CVERecord?id=CVE-2024-52005 git-man CVE-2018-1000021 LOW 1:2.47.3-0+deb13u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://www.cve.org/CVERecord?id=CVE-2018-1000021 git-man CVE-2022-24975 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git-man CVE-2024-52005 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/errata/RHSA-2025:7409 https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/2338289 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005 https://errata.almalinux.org/9/ALSA-2025-7409.html https://errata.rockylinux.org/RLSA-2025:7409 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://linux.oracle.com/cve/CVE-2024-52005.html https://linux.oracle.com/errata/ELSA-2025-8414.html https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://lore.kernel.org/git/8570a129-d66a-465a-905e-0a077c69c409@gmail.com/T/#t https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://www.cve.org/CVERecord?id=CVE-2024-52005 libapt-pkg7.0 CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libasound2-data CVE-2026-25068 MEDIUM 1.2.14-1 no fix available https://access.redhat.com/security/cve/CVE-2026-25068 https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://lists.debian.org/debian-lts-announce/2026/02/msg00008.html https://nvd.nist.gov/vuln/detail/CVE-2026-25068 https://ubuntu.com/security/notices/USN-8044-1 https://www.cve.org/CVERecord?id=CVE-2026-25068 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow libasound2t64 CVE-2026-25068 MEDIUM 1.2.14-1 no fix available https://access.redhat.com/security/cve/CVE-2026-25068 https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://lists.debian.org/debian-lts-announce/2026/02/msg00008.html https://nvd.nist.gov/vuln/detail/CVE-2026-25068 https://ubuntu.com/security/notices/USN-8044-1 https://www.cve.org/CVERecord?id=CVE-2026-25068 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow libauthen-sasl-perl CVE-2025-40918 MEDIUM 2.1700-1 no fix available http://www.openwall.com/lists/oss-security/2025/07/16/5 https://access.redhat.com/security/cve/CVE-2025-40918 https://datatracker.ietf.org/doc/html/rfc2831 https://github.com/gbarr/perl-authen-sasl/pull/22 https://metacpan.org/dist/Authen-SASL/source/lib/Authen/SASL/Perl/DIGEST_MD5.pm#L263 https://metacpan.org/release/EHUELS/Authen-SASL-2.1900/changes https://nvd.nist.gov/vuln/detail/CVE-2025-40918 https://security.metacpan.org/patches/A/Authen-SASL/2.1800/CVE-2025-40918-r1.patch https://www.cve.org/CVERecord?id=CVE-2025-40918 libavahi-client3 CVE-2024-52615 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:16441 https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615 https://errata.rockylinux.org/RLSA-2025:11402 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/pull/577 https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g https://linux.oracle.com/cve/CVE-2024-52615.html https://linux.oracle.com/errata/ELSA-2025-16441.html https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://www.cve.org/CVERecord?id=CVE-2024-52615 libavahi-client3 CVE-2024-52616 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/2326429 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616 https://errata.almalinux.org/9/ALSA-2025-7437.html https://errata.rockylinux.org/RLSA-2025:7437 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/pull/577 https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm https://linux.oracle.com/cve/CVE-2024-52616.html https://linux.oracle.com/errata/ELSA-2025-7437.html https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://www.cve.org/CVERecord?id=CVE-2024-52616 libavahi-client3 CVE-2025-59529 MEDIUM 0.8-16 no fix available http://www.openwall.com/lists/oss-security/2025/12/19/1 https://access.redhat.com/security/cve/CVE-2025-59529 https://github.com/avahi/avahi/pull/808 https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 libavahi-client3 CVE-2025-68276 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68276 libavahi-client3 CVE-2025-68468 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68468 libavahi-client3 CVE-2025-68471 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68471 libavahi-client3 CVE-2026-24401 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://www.cve.org/CVERecord?id=CVE-2026-24401 libavahi-common-data CVE-2024-52615 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:16441 https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615 https://errata.rockylinux.org/RLSA-2025:11402 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/pull/577 https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g https://linux.oracle.com/cve/CVE-2024-52615.html https://linux.oracle.com/errata/ELSA-2025-16441.html https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://www.cve.org/CVERecord?id=CVE-2024-52615 libavahi-common-data CVE-2024-52616 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/2326429 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616 https://errata.almalinux.org/9/ALSA-2025-7437.html https://errata.rockylinux.org/RLSA-2025:7437 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/pull/577 https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm https://linux.oracle.com/cve/CVE-2024-52616.html https://linux.oracle.com/errata/ELSA-2025-7437.html https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://www.cve.org/CVERecord?id=CVE-2024-52616 libavahi-common-data CVE-2025-59529 MEDIUM 0.8-16 no fix available http://www.openwall.com/lists/oss-security/2025/12/19/1 https://access.redhat.com/security/cve/CVE-2025-59529 https://github.com/avahi/avahi/pull/808 https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 libavahi-common-data CVE-2025-68276 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68276 libavahi-common-data CVE-2025-68468 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68468 libavahi-common-data CVE-2025-68471 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68471 libavahi-common-data CVE-2026-24401 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://www.cve.org/CVERecord?id=CVE-2026-24401 libavahi-common3 CVE-2024-52615 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:11402 https://access.redhat.com/errata/RHSA-2025:16441 https://access.redhat.com/security/cve/CVE-2024-52615 https://bugzilla.redhat.com/show_bug.cgi?id=2326418 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615 https://errata.rockylinux.org/RLSA-2025:11402 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/pull/577 https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g https://linux.oracle.com/cve/CVE-2024-52615.html https://linux.oracle.com/errata/ELSA-2025-16441.html https://nvd.nist.gov/vuln/detail/CVE-2024-52615 https://www.cve.org/CVERecord?id=CVE-2024-52615 libavahi-common3 CVE-2024-52616 MEDIUM 0.8-16 no fix available https://access.redhat.com/errata/RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616 https://bugzilla.redhat.com/2326429 https://bugzilla.redhat.com/show_bug.cgi?id=2326429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616 https://errata.almalinux.org/9/ALSA-2025-7437.html https://errata.rockylinux.org/RLSA-2025:7437 https://github.com/avahi/avahi/issues/254#issuecomment-2480519212 https://github.com/avahi/avahi/pull/577 https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm https://linux.oracle.com/cve/CVE-2024-52616.html https://linux.oracle.com/errata/ELSA-2025-7437.html https://nvd.nist.gov/vuln/detail/CVE-2024-52616 https://www.cve.org/CVERecord?id=CVE-2024-52616 libavahi-common3 CVE-2025-59529 MEDIUM 0.8-16 no fix available http://www.openwall.com/lists/oss-security/2025/12/19/1 https://access.redhat.com/security/cve/CVE-2025-59529 https://github.com/avahi/avahi/pull/808 https://github.com/avahi/avahi/security/advisories/GHSA-73wf-3xmj-x82q https://nvd.nist.gov/vuln/detail/CVE-2025-59529 https://www.cve.org/CVERecord?id=CVE-2025-59529 https://zeropath.com/blog/avahi-simple-protocol-server-dos-cve-2025-59529 libavahi-common3 CVE-2025-68276 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68276 https://github.com/avahi/avahi/commit/ede7048475c5d47d53890e3bc1350dda8e0b3688 https://github.com/avahi/avahi/pull/806 https://github.com/avahi/avahi/security/advisories/GHSA-mhf3-865v-g5rc https://nvd.nist.gov/vuln/detail/CVE-2025-68276 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68276 libavahi-common3 CVE-2025-68468 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68468 https://github.com/avahi/avahi/commit/f66be13d7f31a3ef806d226bf8b67240179d309a https://github.com/avahi/avahi/issues/683 https://github.com/avahi/avahi/security/advisories/GHSA-cp79-r4x9-vf52 https://nvd.nist.gov/vuln/detail/CVE-2025-68468 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68468 libavahi-common3 CVE-2025-68471 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2025-68471 https://github.com/avahi/avahi/commit/9c6eb53bf2e290aed84b1f207e3ce35c54cc0aa1 https://github.com/avahi/avahi/issues/678 https://github.com/avahi/avahi/security/advisories/GHSA-56rf-42xr-qmmg https://nvd.nist.gov/vuln/detail/CVE-2025-68471 https://ubuntu.com/security/notices/USN-7967-1 https://www.cve.org/CVERecord?id=CVE-2025-68471 libavahi-common3 CVE-2026-24401 MEDIUM 0.8-16 no fix available https://access.redhat.com/security/cve/CVE-2026-24401 https://github.com/avahi/avahi/commit/78eab31128479f06e30beb8c1cbf99dd921e2524 https://github.com/avahi/avahi/issues/501 https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3 https://nvd.nist.gov/vuln/detail/CVE-2026-24401 https://www.cve.org/CVERecord?id=CVE-2026-24401 libavcodec61 CVE-2025-22921 MEDIUM 7:7.1.3-0+deb13u1 no fix available https://lists.debian.org/debian-lts-announce/2025/02/msg00037.html https://trac.ffmpeg.org/ticket/11393 https://ubuntu.com/security/notices/USN-7538-1 https://www.cve.org/CVERecord?id=CVE-2025-22921 libavformat61 CVE-2025-22921 MEDIUM 7:7.1.3-0+deb13u1 no fix available https://lists.debian.org/debian-lts-announce/2025/02/msg00037.html https://trac.ffmpeg.org/ticket/11393 https://ubuntu.com/security/notices/USN-7538-1 https://www.cve.org/CVERecord?id=CVE-2025-22921 libavutil59 CVE-2025-22921 MEDIUM 7:7.1.3-0+deb13u1 no fix available https://lists.debian.org/debian-lts-announce/2025/02/msg00037.html https://trac.ffmpeg.org/ticket/11393 https://ubuntu.com/security/notices/USN-7538-1 https://www.cve.org/CVERecord?id=CVE-2025-22921 libblkid1 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libblkid1 CVE-2025-14104 LOW 2.41-5 no fix available https://access.redhat.com/errata/RHSA-2026:1696 https://access.redhat.com/errata/RHSA-2026:1852 https://access.redhat.com/errata/RHSA-2026:1913 https://access.redhat.com/errata/RHSA-2026:2485 https://access.redhat.com/errata/RHSA-2026:2563 https://access.redhat.com/errata/RHSA-2026:2737 https://access.redhat.com/errata/RHSA-2026:2800 https://access.redhat.com/errata/RHSA-2026:3406 https://access.redhat.com/errata/RHSA-2026:4943 https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/2419369 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104 https://errata.almalinux.org/9/ALSA-2026-1913.html https://errata.rockylinux.org/RLSA-2026:1913 https://linux.oracle.com/cve/CVE-2025-14104.html https://linux.oracle.com/errata/ELSA-2026-1913.html https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 libblkid1 CVE-2026-3184 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2026-3184 https://nvd.nist.gov/vuln/detail/CVE-2026-3184 https://www.cve.org/CVERecord?id=CVE-2026-3184 libc-bin CVE-2026-4046 HIGH 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4046 https://nvd.nist.gov/vuln/detail/CVE-2026-4046 https://sourceware.org/bugzilla/show_bug.cgi?id=33980 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD https://www.cve.org/CVERecord?id=CVE-2026-4046 libc-bin CVE-2026-4437 MEDIUM 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4437 https://nvd.nist.gov/vuln/detail/CVE-2026-4437 https://sourceware.org/bugzilla/show_bug.cgi?id=34014 https://www.cve.org/CVERecord?id=CVE-2026-4437 libc-bin CVE-2026-4438 MEDIUM 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2026-4438 https://nvd.nist.gov/vuln/detail/CVE-2026-4438 https://sourceware.org/bugzilla/show_bug.cgi?id=34015 https://www.cve.org/CVERecord?id=CVE-2026-4438 libc-bin CVE-2010-4756 LOW 2.41-12+deb13u2 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.41-12+deb13u2 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.41-12+deb13u2 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 295 other vulnerabilities found... No Misconfigurations found Node.js (node-pkg)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links brace-expansion CVE-2026-33750 MEDIUM 5.0.3 5.0.5, 3.0.2, 2.0.3, 1.1.13 https://access.redhat.com/security/cve/CVE-2026-33750 https://github.com/juliangruber/brace-expansion https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113 https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184 https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5 https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2 https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a https://github.com/juliangruber/brace-expansion/issues/98 https://github.com/juliangruber/brace-expansion/pull/95 https://github.com/juliangruber/brace-expansion/pull/96 https://github.com/juliangruber/brace-expansion/pull/97 https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v https://nvd.nist.gov/vuln/detail/CVE-2026-33750 https://www.cve.org/CVERecord?id=CVE-2026-33750 minimatch CVE-2026-27903 HIGH 10.2.2 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 https://access.redhat.com/security/cve/CVE-2026-27903 https://github.com/isaacs/minimatch https://github.com/isaacs/minimatch/commit/0bf499aa45f5059b56809cc3b75ff3eafeb8d748 https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj https://nvd.nist.gov/vuln/detail/CVE-2026-27903 https://www.cve.org/CVERecord?id=CVE-2026-27903 minimatch CVE-2026-27904 HIGH 10.2.2 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 https://access.redhat.com/security/cve/CVE-2026-27904 https://github.com/isaacs/minimatch https://github.com/isaacs/minimatch/commit/11d0df6165d15a955462316b26d52e5efae06fce https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74 https://nvd.nist.gov/vuln/detail/CVE-2026-27904 https://www.cve.org/CVERecord?id=CVE-2026-27904 picomatch CVE-2026-33671 HIGH 4.0.3 4.0.4, 3.0.2, 2.3.2 https://access.redhat.com/security/cve/CVE-2026-33671 https://github.com/micromatch/picomatch https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj https://nvd.nist.gov/vuln/detail/CVE-2026-33671 https://www.cve.org/CVERecord?id=CVE-2026-33671 picomatch CVE-2026-33672 MEDIUM 4.0.3 4.0.4, 3.0.2, 2.3.2 https://access.redhat.com/security/cve/CVE-2026-33672 https://github.com/micromatch/picomatch https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903 https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p https://nvd.nist.gov/vuln/detail/CVE-2026-33672 https://www.cve.org/CVERecord?id=CVE-2026-33672 tar CVE-2026-29786 HIGH 7.5.9 7.5.10 https://access.redhat.com/security/cve/CVE-2026-29786 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/7bc755dd85e623c0279e08eb3784909e6d7e4b9f https://github.com/isaacs/node-tar/security/advisories/GHSA-qffp-2rhf-9h96 https://nvd.nist.gov/vuln/detail/CVE-2026-29786 https://www.cve.org/CVERecord?id=CVE-2026-29786 tar CVE-2026-31802 HIGH 7.5.9 7.5.11 https://access.redhat.com/security/cve/CVE-2026-31802 https://github.com/isaacs/node-tar https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256 https://nvd.nist.gov/vuln/detail/CVE-2026-31802 https://www.cve.org/CVERecord?id=CVE-2026-31802 No Misconfigurations found