ghcr.io/puppeteer/puppeteer:latest (debian 12.8)¶ Trivy Image Scan Image: ghcr.io/puppeteer/puppeteer:latest (debian 12.8) Scan date: 2024-12-04 ghcr.io/puppeteer/puppeteer:latest (debian 12.8) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 2.6.1 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.15-2+b7 no fix available binutils CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 binutils CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 binutils CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 binutils CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 binutils CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 binutils CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 binutils-common CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 binutils-common CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 binutils-common CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 binutils-common CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 binutils-common CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 binutils-common CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 binutils-x86-64-linux-gnu CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 binutils-x86-64-linux-gnu CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 binutils-x86-64-linux-gnu CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 binutils-x86-64-linux-gnu CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 binutils-x86-64-linux-gnu CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 binutils-x86-64-linux-gnu CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 bsdutils CVE-2022-0563 LOW 1:2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 coreutils CVE-2016-2781 LOW 9.1-1 no fix available http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes https://nvd.nist.gov/vuln/detail/CVE-2016-2781 https://www.cve.org/CVERecord?id=CVE-2016-2781 coreutils CVE-2017-18018 LOW 9.1-1 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 cpp-12 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 cpp-12 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 curl CVE-2024-9681 MEDIUM 7.88.1-10+deb12u8 no fix available http://www.openwall.com/lists/oss-security/2024/11/06/2 https://access.redhat.com/security/cve/CVE-2024-9681 https://curl.se/docs/CVE-2024-9681.html https://curl.se/docs/CVE-2024-9681.json https://hackerone.com/reports/2764830 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://ubuntu.com/security/notices/USN-7104-1 https://www.cve.org/CVERecord?id=CVE-2024-9681 curl CVE-2024-2379 LOW 7.88.1-10+deb12u8 no fix available http://seclists.org/fulldisclosure/2024/Jul/18 http://seclists.org/fulldisclosure/2024/Jul/19 http://seclists.org/fulldisclosure/2024/Jul/20 http://www.openwall.com/lists/oss-security/2024/03/27/2 https://access.redhat.com/security/cve/CVE-2024-2379 https://curl.se/docs/CVE-2024-2379.html https://curl.se/docs/CVE-2024-2379.json https://hackerone.com/reports/2410774 https://nvd.nist.gov/vuln/detail/CVE-2024-2379 https://security.netapp.com/advisory/ntap-20240531-0001/ https://support.apple.com/kb/HT214118 https://support.apple.com/kb/HT214119 https://support.apple.com/kb/HT214120 https://www.cve.org/CVERecord?id=CVE-2024-2379 dirmngr CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 g++-12 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 g++-12 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 gcc-12 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 gcc-12 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 gcc-12-base CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 gcc-12-base CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 git CVE-2018-1000021 LOW 1:2.39.5-0+deb12u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://public-inbox.org/git/20180205204312.GB104086@aiede.svl.corp.google.com/ https://www.cve.org/CVERecord?id=CVE-2018-1000021 git CVE-2022-24975 LOW 1:2.39.5-0+deb12u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git-man CVE-2018-1000021 LOW 1:2.39.5-0+deb12u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://public-inbox.org/git/20180205204312.GB104086@aiede.svl.corp.google.com/ https://www.cve.org/CVERecord?id=CVE-2018-1000021 git-man CVE-2022-24975 LOW 1:2.39.5-0+deb12u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ gnupg CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gnupg-l10n CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gnupg-utils CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpg CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpg-agent CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpg-wks-client CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpg-wks-server CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpgconf CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpgsm CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 gpgv CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 imagemagick CVE-2005-0406 LOW 8:6.9.11.60+dfsg-1.6+deb12u2 no fix available http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt imagemagick CVE-2008-3134 LOW 8:6.9.11.60+dfsg-1.6+deb12u2 no fix available http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html http://secunia.com/advisories/30879 http://secunia.com/advisories/32151 http://sourceforge.net/forum/forum.php?forum_id=841176 http://sourceforge.net/project/shownotes.php?release_id=610253 http://www.securityfocus.com/bid/30055 http://www.securitytracker.com/id?1020413 http://www.vupen.com/english/advisories/2008/1984/references https://access.redhat.com/security/cve/CVE-2008-3134 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513 https://nvd.nist.gov/vuln/detail/CVE-2008-3134 https://www.cve.org/CVERecord?id=CVE-2008-3134 1153 other vulnerabilities found... No Misconfigurations found Node.js (node-pkg)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links cross-spawn CVE-2024-21538 HIGH 7.0.3 7.0.5, 6.0.6 https://access.redhat.com/security/cve/CVE-2024-21538 https://github.com/moxystudio/node-cross-spawn https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd https://github.com/moxystudio/node-cross-spawn/issues/165 https://github.com/moxystudio/node-cross-spawn/pull/160 https://nvd.nist.gov/vuln/detail/CVE-2024-21538 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349 https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230 https://www.cve.org/CVERecord?id=CVE-2024-21538 No Misconfigurations found