| libexpat1 |
CVE-2025-59375 |
HIGH |
2.7.1-2 |
|
https://access.redhat.com/security/cve/CVE-2025-59375
https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74
https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes
https://github.com/libexpat/libexpat/issues/1018
https://github.com/libexpat/libexpat/pull/1034
https://issues.oss-fuzz.com/issues/439133977
https://nvd.nist.gov/vuln/detail/CVE-2025-59375
https://www.cve.org/CVERecord?id=CVE-2025-59375
|
| libexpat1-dev |
CVE-2025-59375 |
HIGH |
2.7.1-2 |
|
https://access.redhat.com/security/cve/CVE-2025-59375
https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74
https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes
https://github.com/libexpat/libexpat/issues/1018
https://github.com/libexpat/libexpat/pull/1034
https://issues.oss-fuzz.com/issues/439133977
https://nvd.nist.gov/vuln/detail/CVE-2025-59375
https://www.cve.org/CVERecord?id=CVE-2025-59375
|
| libpython3.13-minimal |
CVE-2025-8194 |
HIGH |
3.13.5-2 |
|
https://access.redhat.com/errata/RHSA-2025:15019
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/9/ALSA-2025-15019.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-15019.html
https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| libpython3.13-stdlib |
CVE-2025-8194 |
HIGH |
3.13.5-2 |
|
https://access.redhat.com/errata/RHSA-2025:15019
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/9/ALSA-2025-15019.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-15019.html
https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| libtiff-dev |
CVE-2025-9900 |
HIGH |
4.7.0-3 |
|
https://access.redhat.com/security/cve/CVE-2025-9900
https://bugzilla.redhat.com/show_bug.cgi?id=2392784
https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file
https://gitlab.com/libtiff/libtiff/-/commit/3e0dcf0ec651638b2bd849b2e6f3124b36890d99 (v4.7.1rc1)
https://gitlab.com/libtiff/libtiff/-/issues/704
https://gitlab.com/libtiff/libtiff/-/merge_requests/732
https://nvd.nist.gov/vuln/detail/CVE-2025-9900
https://ubuntu.com/security/notices/USN-7783-1
https://www.cve.org/CVERecord?id=CVE-2025-9900
|
| libtiff6 |
CVE-2025-9900 |
HIGH |
4.7.0-3 |
|
https://access.redhat.com/security/cve/CVE-2025-9900
https://bugzilla.redhat.com/show_bug.cgi?id=2392784
https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file
https://gitlab.com/libtiff/libtiff/-/commit/3e0dcf0ec651638b2bd849b2e6f3124b36890d99 (v4.7.1rc1)
https://gitlab.com/libtiff/libtiff/-/issues/704
https://gitlab.com/libtiff/libtiff/-/merge_requests/732
https://nvd.nist.gov/vuln/detail/CVE-2025-9900
https://ubuntu.com/security/notices/USN-7783-1
https://www.cve.org/CVERecord?id=CVE-2025-9900
|
| libtiffxx6 |
CVE-2025-9900 |
HIGH |
4.7.0-3 |
|
https://access.redhat.com/security/cve/CVE-2025-9900
https://bugzilla.redhat.com/show_bug.cgi?id=2392784
https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file
https://gitlab.com/libtiff/libtiff/-/commit/3e0dcf0ec651638b2bd849b2e6f3124b36890d99 (v4.7.1rc1)
https://gitlab.com/libtiff/libtiff/-/issues/704
https://gitlab.com/libtiff/libtiff/-/merge_requests/732
https://nvd.nist.gov/vuln/detail/CVE-2025-9900
https://ubuntu.com/security/notices/USN-7783-1
https://www.cve.org/CVERecord?id=CVE-2025-9900
|
| linux-libc-dev |
CVE-2013-7445 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
https://nvd.nist.gov/vuln/detail/CVE-2013-7445
https://www.cve.org/CVERecord?id=CVE-2013-7445
|
| linux-libc-dev |
CVE-2019-19449 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://nvd.nist.gov/vuln/detail/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2019-19449
|
| linux-libc-dev |
CVE-2019-19814 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://nvd.nist.gov/vuln/detail/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
https://www.cve.org/CVERecord?id=CVE-2019-19814
|
| linux-libc-dev |
CVE-2021-3847 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2021-3847
https://bugzilla.redhat.com/show_bug.cgi?id=2009704
https://nvd.nist.gov/vuln/detail/CVE-2021-3847
https://www.cve.org/CVERecord?id=CVE-2021-3847
https://www.openwall.com/lists/oss-security/2021/10/14/3
|
| linux-libc-dev |
CVE-2021-3864 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2021-3864
https://bugzilla.redhat.com/show_bug.cgi?id=2015046
https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://nvd.nist.gov/vuln/detail/CVE-2021-3864
https://security-tracker.debian.org/tracker/CVE-2021-3864
https://www.cve.org/CVERecord?id=CVE-2021-3864
https://www.openwall.com/lists/oss-security/2021/10/20/2
|
| linux-libc-dev |
CVE-2024-21803 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2024-21803
https://bugzilla.openanolis.cn/show_bug.cgi?id=8081
https://nvd.nist.gov/vuln/detail/CVE-2024-21803
https://www.cve.org/CVERecord?id=CVE-2024-21803
|
| linux-libc-dev |
CVE-2025-21709 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-21709
https://git.kernel.org/linus/64c37e134b120fb462fb4a80694bfb8e7be77b14 (6.14-rc1)
https://git.kernel.org/stable/c/64c37e134b120fb462fb4a80694bfb8e7be77b14
https://git.kernel.org/stable/c/da139948aeda677ac09cc0e7d837f8a314de7d55
https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21709-e967@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-21709
https://www.cve.org/CVERecord?id=CVE-2025-21709
|
| linux-libc-dev |
CVE-2025-22104 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/errata/RHSA-2025:9302
https://access.redhat.com/security/cve/CVE-2025-22104
https://bugzilla.redhat.com/2355415
https://bugzilla.redhat.com/2356618
https://bugzilla.redhat.com/2360265
https://bugzilla.redhat.com/2363268
https://bugzilla.redhat.com/2363305
https://errata.almalinux.org/9/ALSA-2025-9302.html
https://git.kernel.org/linus/d93a6caab5d7d9b5ce034d75b1e1e993338e3852 (6.15-rc1)
https://git.kernel.org/stable/c/ae6b1d6c1acee3a2000394d83ec9f1028321e207
https://git.kernel.org/stable/c/d93a6caab5d7d9b5ce034d75b1e1e993338e3852
https://linux.oracle.com/cve/CVE-2025-22104.html
https://linux.oracle.com/errata/ELSA-2025-9896.html
https://lore.kernel.org/linux-cve-announce/2025041622-CVE-2025-22104-0a82@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-22104
https://ubuntu.com/security/notices/USN-7594-1
https://ubuntu.com/security/notices/USN-7594-2
https://ubuntu.com/security/notices/USN-7594-3
https://www.cve.org/CVERecord?id=CVE-2025-22104
|
| linux-libc-dev |
CVE-2025-22121 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/errata/RHSA-2025:11861
https://access.redhat.com/security/cve/CVE-2025-22121
https://bugzilla.redhat.com/2348599
https://bugzilla.redhat.com/2356613
https://bugzilla.redhat.com/2360186
https://bugzilla.redhat.com/2360199
https://bugzilla.redhat.com/2360212
https://bugzilla.redhat.com/2360219
https://bugzilla.redhat.com/2363672
https://bugzilla.redhat.com/2367572
https://bugzilla.redhat.com/2375305
https://bugzilla.redhat.com/2376035
https://errata.almalinux.org/9/ALSA-2025-11861.html
https://git.kernel.org/linus/5701875f9609b000d91351eaa6bfd97fe2f157f4 (6.15-rc1)
https://git.kernel.org/stable/c/0c8fbb6ffb3c8f5164572ca88e4ccb6cd6a41ca8
https://git.kernel.org/stable/c/5701875f9609b000d91351eaa6bfd97fe2f157f4
https://linux.oracle.com/cve/CVE-2025-22121.html
https://linux.oracle.com/errata/ELSA-2025-11861.html
https://lore.kernel.org/linux-cve-announce/2025041628-CVE-2025-22121-52fd@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-22121
https://ubuntu.com/security/notices/USN-7594-1
https://ubuntu.com/security/notices/USN-7594-2
https://ubuntu.com/security/notices/USN-7594-3
https://www.cve.org/CVERecord?id=CVE-2025-22121
|
| linux-libc-dev |
CVE-2025-37825 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-37825
https://git.kernel.org/linus/3d7aa0c7b4e96cd460826d932e44710cdeb3378b (6.15-rc4)
https://git.kernel.org/stable/c/3d7aa0c7b4e96cd460826d932e44710cdeb3378b
https://git.kernel.org/stable/c/83c00860a37b3fcba8026cb344101f1b8af547cf
https://lore.kernel.org/linux-cve-announce/2025050822-CVE-2025-37825-547b@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-37825
https://ubuntu.com/security/notices/USN-7594-1
https://ubuntu.com/security/notices/USN-7594-2
https://ubuntu.com/security/notices/USN-7594-3
https://www.cve.org/CVERecord?id=CVE-2025-37825
|
| linux-libc-dev |
CVE-2025-37906 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-37906
https://git.kernel.org/linus/f40139fde5278d81af3227444fd6e76a76b9506d (6.15-rc4)
https://git.kernel.org/stable/c/f40139fde5278d81af3227444fd6e76a76b9506d
https://git.kernel.org/stable/c/fb2eb9ddf556f93fef45201e1f9d2b8674bcc975
https://lore.kernel.org/linux-cve-announce/2025052057-CVE-2025-37906-0bd6@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-37906
https://ubuntu.com/security/notices/USN-7649-1
https://ubuntu.com/security/notices/USN-7649-2
https://ubuntu.com/security/notices/USN-7650-1
https://ubuntu.com/security/notices/USN-7665-1
https://ubuntu.com/security/notices/USN-7665-2
https://ubuntu.com/security/notices/USN-7721-1
https://www.cve.org/CVERecord?id=CVE-2025-37906
|
| linux-libc-dev |
CVE-2025-38029 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38029
https://git.kernel.org/linus/b6ea95a34cbd014ab6ade4248107b86b0aaf2d6c (6.15)
https://git.kernel.org/stable/c/6748dd09196248b985cca39eaf651d5317271977
https://git.kernel.org/stable/c/b6ea95a34cbd014ab6ade4248107b86b0aaf2d6c
https://lore.kernel.org/linux-cve-announce/2025061824-CVE-2025-38029-47a6@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38029
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38029
|
| linux-libc-dev |
CVE-2025-38036 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38036
https://git.kernel.org/linus/13265fe7426ec9ba5aa86baab913417ca361e8a4 (6.15-rc1)
https://git.kernel.org/stable/c/13265fe7426ec9ba5aa86baab913417ca361e8a4
https://git.kernel.org/stable/c/ef6e950aea76a5009ccc79ebfa955ecc66cd85a2
https://lore.kernel.org/linux-cve-announce/2025061826-CVE-2025-38036-0063@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38036
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38036
|
| linux-libc-dev |
CVE-2025-38041 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38041
https://git.kernel.org/linus/eb963d7948ce6571939c6875424b557b25f16610 (6.15-rc1)
https://git.kernel.org/stable/c/1439673b78185eaaa5fae444b3a9d58c434ee78e
https://git.kernel.org/stable/c/eb963d7948ce6571939c6875424b557b25f16610
https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2025-38041-7d47@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38041
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38041
|
| linux-libc-dev |
CVE-2025-38042 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38042
https://git.kernel.org/linus/0da30874729baeb01889b0eca16cfda122687503 (6.15-rc1)
https://git.kernel.org/stable/c/0da30874729baeb01889b0eca16cfda122687503
https://git.kernel.org/stable/c/d0dd9d133ef8fdc894e0be9aa27dc49ef5f813cb
https://lore.kernel.org/linux-cve-announce/2025061828-CVE-2025-38042-6f41@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38042
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38042
|
| linux-libc-dev |
CVE-2025-38064 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38064
https://git.kernel.org/linus/8bd2fa086a04886798b505f28db4002525895203 (6.15-rc1)
https://git.kernel.org/stable/c/8bd2fa086a04886798b505f28db4002525895203
https://git.kernel.org/stable/c/aee42f3d57bfa37b2716df4584edeecf63b9df4c
https://lore.kernel.org/linux-cve-announce/2025061836-CVE-2025-38064-8108@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38064
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38064
|
| linux-libc-dev |
CVE-2025-38105 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38105
https://git.kernel.org/linus/0718a78f6a9f04b88d0dc9616cc216b31c5f3cf1 (6.16-rc1)
https://git.kernel.org/stable/c/0718a78f6a9f04b88d0dc9616cc216b31c5f3cf1
https://git.kernel.org/stable/c/62066758d2ae169278e5d6aea5995b1b6f6ddeb5
https://lore.kernel.org/linux-cve-announce/2025070322-CVE-2025-38105-dfcf@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38105
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38105
|
| linux-libc-dev |
CVE-2025-38137 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38137
https://git.kernel.org/linus/8b926f237743f020518162c62b93cb7107a2b5eb (6.16-rc1)
https://git.kernel.org/stable/c/8b926f237743f020518162c62b93cb7107a2b5eb
https://git.kernel.org/stable/c/b3ad6d23fec23fbef382ce9ea640c37446593cf5
https://linux.oracle.com/cve/CVE-2025-38137.html
https://linux.oracle.com/errata/ELSA-2025-13598.html
https://lore.kernel.org/linux-cve-announce/2025070332-CVE-2025-38137-d4bf@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38137
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38137
|
| linux-libc-dev |
CVE-2025-38140 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38140
https://git.kernel.org/linus/121218bef4c1df165181f5cd8fc3a2246bac817e (6.16-rc1)
https://git.kernel.org/stable/c/121218bef4c1df165181f5cd8fc3a2246bac817e
https://git.kernel.org/stable/c/ac8acb0bfd98a1c65f3ca9a3e217a766124eebd8
https://lore.kernel.org/linux-cve-announce/2025070333-CVE-2025-38140-0ba9@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38140
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38140
|
| linux-libc-dev |
CVE-2025-38248 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38248
https://git.kernel.org/linus/7544f3f5b0b58c396f374d060898b5939da31709 (6.16-rc4)
https://git.kernel.org/stable/c/7544f3f5b0b58c396f374d060898b5939da31709
https://git.kernel.org/stable/c/f05a4f9e959e0fc098046044c650acf897ea52d2
https://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38248-003c@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38248
https://www.cve.org/CVERecord?id=CVE-2025-38248
|
| linux-libc-dev |
CVE-2025-38311 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38311
https://git.kernel.org/linus/120f28a6f314fef7f282c99f196923fe44081cad (6.16-rc1)
https://git.kernel.org/stable/c/120f28a6f314fef7f282c99f196923fe44081cad
https://git.kernel.org/stable/c/620ab4d6215de0b25227f9fff1a8c7fb66837cb8
https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38311-2a53@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38311
https://ubuntu.com/security/notices/USN-7769-1
https://ubuntu.com/security/notices/USN-7769-2
https://ubuntu.com/security/notices/USN-7769-3
https://ubuntu.com/security/notices/USN-7770-1
https://ubuntu.com/security/notices/USN-7771-1
https://www.cve.org/CVERecord?id=CVE-2025-38311
|
| linux-libc-dev |
CVE-2025-38322 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-38322
https://git.kernel.org/linus/b0823d5fbacb1c551d793cbfe7af24e0d1fa45ed (6.16-rc3)
https://git.kernel.org/stable/c/702ea6028032d6c1fe96c2d4762a3575e3654819
https://git.kernel.org/stable/c/79e2dd573116d3338507c311460da9669095c94d
https://git.kernel.org/stable/c/a85cc69acdcb05f8cd226b8ea0778b8e2e887e6f
https://git.kernel.org/stable/c/b0823d5fbacb1c551d793cbfe7af24e0d1fa45ed
https://git.kernel.org/stable/c/e97c45c770f5e56c784a46c2a96ab968d26b97d9
https://lore.kernel.org/linux-cve-announce/2025071031-CVE-2025-38322-810a@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-38322
https://www.cve.org/CVERecord?id=CVE-2025-38322
|
| linux-libc-dev |
CVE-2025-39677 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-39677
https://git.kernel.org/linus/52bf272636bda69587952b35ae97690b8dc89941 (6.17-rc3)
https://git.kernel.org/stable/c/52bf272636bda69587952b35ae97690b8dc89941
https://git.kernel.org/stable/c/a225f44d84b8900d679c5f5a9ea46fe9c0cc7802
https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39677-5733@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-39677
https://www.cve.org/CVERecord?id=CVE-2025-39677
|
| linux-libc-dev |
CVE-2025-39775 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-39775
https://git.kernel.org/linus/772e5b4a5e8360743645b9a466842d16092c4f94 (6.17-rc3)
https://git.kernel.org/stable/c/772e5b4a5e8360743645b9a466842d16092c4f94
https://git.kernel.org/stable/c/d70ca21f7bff162a5afae1ddd6f4107adf05ae23
https://lore.kernel.org/linux-cve-announce/2025091147-CVE-2025-39775-4e21@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-39775
https://www.cve.org/CVERecord?id=CVE-2025-39775
|
| linux-libc-dev |
CVE-2025-40014 |
HIGH |
6.12.48-1 |
|
https://access.redhat.com/security/cve/CVE-2025-40014
https://git.kernel.org/linus/76e51db43fe4aaaebcc5ddda67b0807f7c9bdecc (6.15-rc1)
https://git.kernel.org/stable/c/76e51db43fe4aaaebcc5ddda67b0807f7c9bdecc
https://git.kernel.org/stable/c/7f2c746e09a3746bf937bc708129dc8af61d8f19
https://lore.kernel.org/linux-cve-announce/2025041822-CVE-2025-40014-384f@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2025-40014
https://ubuntu.com/security/notices/USN-7594-1
https://ubuntu.com/security/notices/USN-7594-2
https://ubuntu.com/security/notices/USN-7594-3
https://www.cve.org/CVERecord?id=CVE-2025-40014
|
| python3.13 |
CVE-2025-8194 |
HIGH |
3.13.5-2 |
|
https://access.redhat.com/errata/RHSA-2025:15019
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/9/ALSA-2025-15019.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-15019.html
https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| python3.13-minimal |
CVE-2025-8194 |
HIGH |
3.13.5-2 |
|
https://access.redhat.com/errata/RHSA-2025:15019
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/9/ALSA-2025-15019.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-15019.html
https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| No Misconfigurations found |
| No Vulnerabilities found |
| No Misconfigurations found |
| dompdf/dompdf |
CVE-2021-3838 |
CRITICAL |
v1.2.2 |
2.0.0 |
https://github.com/dompdf/dompdf
https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a
https://github.com/dompdf/dompdf/issues/2564
https://huntr.com/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
https://nvd.nist.gov/vuln/detail/CVE-2021-3838
https://ubuntu.com/security/notices/USN-6277-1
https://ubuntu.com/security/notices/USN-6277-2
https://www.cve.org/CVERecord?id=CVE-2021-3838
|
| dompdf/dompdf |
CVE-2021-3902 |
CRITICAL |
v1.2.2 |
2.0.0 |
https://github.com/dompdf/dompdf
https://github.com/dompdf/dompdf/commit/f56bc8e40be6c0ae0825e6c7396f4db80620b799
https://huntr.com/bounties/a6071c07-806f-429a-8656-a4742e4191b1
https://nvd.nist.gov/vuln/detail/CVE-2021-3902
|
| dompdf/dompdf |
CVE-2023-23924 |
CRITICAL |
v1.2.2 |
2.0.2 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2023-23924.yaml
https://github.com/advisories/GHSA-3cw5-7cxw-v5qg
https://github.com/dompdf/dompdf
https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85
https://github.com/dompdf/dompdf/releases/tag/v2.0.2
https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg
https://nvd.nist.gov/vuln/detail/CVE-2023-23924
|
| dompdf/dompdf |
CVE-2022-41343 |
HIGH |
v1.2.2 |
2.0.1 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2022-41343.yaml
https://github.com/advisories/GHSA-6x28-7h8c-chx4
https://github.com/dompdf/dompdf
https://github.com/dompdf/dompdf/commit/66431c58017d5b1bdb9f6f772b9fbbc5e3d38dc2
https://github.com/dompdf/dompdf/issues/2994
https://github.com/dompdf/dompdf/pull/2995
https://github.com/dompdf/dompdf/releases/tag/v2.0.1
https://nvd.nist.gov/vuln/detail/CVE-2022-41343
https://tantosec.com/blog/cve-2022-41343
https://tantosec.com/blog/cve-2022-41343/
|
| dompdf/dompdf |
CVE-2023-50262 |
HIGH |
v1.2.2 |
2.0.4 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2023-50262.yaml
https://github.com/dompdf/dompdf
https://github.com/dompdf/dompdf/blob/v2.0.3/src/Image/Cache.php#L136-L153
https://github.com/dompdf/dompdf/commit/41cbac16f3cf56affa49f06e8dae66d0eac2b593
https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2
https://nvd.nist.gov/vuln/detail/CVE-2023-50262
|
| guzzlehttp/guzzle |
CVE-2022-29248 |
HIGH |
7.4.2 |
7.4.3, 6.5.6 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-29248.yaml
https://github.com/guzzle/guzzle
https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab
https://github.com/guzzle/guzzle/pull/3018
https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
https://nvd.nist.gov/vuln/detail/CVE-2022-29248
https://www.debian.org/security/2022/dsa-5246
https://www.drupal.org/sa-core-2022-010
|
| guzzlehttp/guzzle |
CVE-2022-31042 |
HIGH |
7.4.2 |
7.4.4, 6.5.7 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml
https://github.com/guzzle/guzzle
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
https://nvd.nist.gov/vuln/detail/CVE-2022-31042
https://www.debian.org/security/2022/dsa-5246
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
|
| guzzlehttp/guzzle |
CVE-2022-31043 |
HIGH |
7.4.2 |
7.4.4, 6.5.7 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml
https://github.com/guzzle/guzzle
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
https://nvd.nist.gov/vuln/detail/CVE-2022-31043
https://www.debian.org/security/2022/dsa-5246
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
|
| guzzlehttp/guzzle |
CVE-2022-31090 |
HIGH |
7.4.2 |
7.4.5, 6.5.8 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml
https://github.com/guzzle/guzzle
https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md
https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md
https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r
https://nvd.nist.gov/vuln/detail/CVE-2022-31090
https://security.gentoo.org/glsa/202305-24
https://www.debian.org/security/2022/dsa-5246
|
| guzzlehttp/guzzle |
CVE-2022-31091 |
HIGH |
7.4.2 |
7.4.5, 6.5.8 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml
https://github.com/guzzle/guzzle
https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
https://nvd.nist.gov/vuln/detail/CVE-2022-31091
https://security.gentoo.org/glsa/202305-24
https://www.debian.org/security/2022/dsa-5246
|
| guzzlehttp/psr7 |
CVE-2022-24775 |
HIGH |
2.1.0 |
2.1.1, 1.8.4 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2022-24775.yaml
https://github.com/guzzle/psr7
https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1
https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc
https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
https://nvd.nist.gov/vuln/detail/CVE-2022-24775
https://ubuntu.com/security/notices/USN-6670-1
https://www.cve.org/CVERecord?id=CVE-2022-24775
https://www.drupal.org/sa-core-2022-006
https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
|
| guzzlehttp/psr7 |
CVE-2023-29197 |
HIGH |
2.1.0 |
2.4.5, 1.9.1 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2023-29197.yaml
https://github.com/Nyholm/psr7/commit/1029a2671cbdd3e075a21952082c2be7c8018426 (1.6.1)
https://github.com/Nyholm/psr7/security/advisories/GHSA-wjfc-pgfp-pv9c
https://github.com/guzzle/psr7
https://github.com/guzzle/psr7/commit/0454e12ef0cd597ccd2adb036f7bda4e7fface66 (2.4.5)
https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U/
https://nvd.nist.gov/vuln/detail/CVE-2023-29197
https://ubuntu.com/security/notices/USN-6670-1
https://ubuntu.com/security/notices/USN-6671-1
https://www.cve.org/CVERecord?id=CVE-2023-29197
https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
|
| laravel/framework |
CVE-2024-52301 |
HIGH |
v8.82.0 |
8.83.28, 9.52.17, 10.48.23, 11.31.0, 6.20.45, 7.30.7 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/laravel/framework/CVE-2024-52301.yaml
https://github.com/advisories/GHSA-gv7v-rgg6-548h
https://github.com/laravel/framework
https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h
https://lists.debian.org/debian-lts-announce/2024/12/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52301
|
| league/commonmark |
GHSA-c2pc-g5qf-rfrf |
HIGH |
2.2.1 |
2.6.0 |
https://github.com/commonmark/commonmark.js/issues/129
https://github.com/commonmark/commonmark.js/issues/157
https://github.com/commonmark/commonmark.js/issues/172
https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r
https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c
https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh
https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p
https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5
https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5
https://github.com/thephpleague/commonmark
https://github.com/thephpleague/commonmark/security/advisories/GHSA-c2pc-g5qf-rfrf
|
| phenx/php-svg-lib |
GHSA-97m3-52wr-xvv2 |
CRITICAL |
0.4.1 |
0.5.2 |
https://github.com/dompdf/dompdf
https://github.com/dompdf/dompdf/security/advisories/GHSA-97m3-52wr-xvv2
https://github.com/dompdf/php-svg-lib/commit/732faa9fb4309221e2bd9b2fda5de44f947133aa
https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273
|
| phpoffice/phpspreadsheet |
CVE-2024-45048 |
HIGH |
1.21.0 |
1.29.1, 2.2.1, 2.1.1 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/bea2d4b30f24bcc8a7712e208d1359e603b45dda
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-ghg6-32f9-2jp7
https://nvd.nist.gov/vuln/detail/CVE-2024-45048
|
| phpoffice/phpspreadsheet |
CVE-2024-45290 |
HIGH |
1.21.0 |
2.3.0, 1.29.2, 2.1.1 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/a9693d1182df6695c14bc5d74315ac71a3398e5a
https://github.com/PHPOffice/PhpSpreadsheet/commit/d95bc290beb137d4118095b96f62ec47e0205cec
https://github.com/PHPOffice/PhpSpreadsheet/commit/e04ed222b36fd5fd6fed0c10c765c2b68effb465
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-5gpr-w2p5-6m37
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-w9xv-qf98-ccq4
https://nvd.nist.gov/vuln/detail/CVE-2024-45290
|
| phpoffice/phpspreadsheet |
CVE-2024-45293 |
HIGH |
1.21.0 |
2.3.0, 1.29.1, 2.1.1 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/3bcd51826b7f089d1641e756c83030c30c3bdb0c
https://github.com/PHPOffice/PhpSpreadsheet/commit/7d6cb09f6e8204f65e6dd5a0490f7f45f44bb331
https://github.com/PHPOffice/PhpSpreadsheet/commit/949ff63e1f6413e6485f73af012d506aa81384bf
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-6hwr-6v2f-3m88
https://nvd.nist.gov/vuln/detail/CVE-2024-45293
|
| phpoffice/phpspreadsheet |
CVE-2024-47873 |
HIGH |
1.21.0 |
1.29.4, 2.1.3, 2.3.2, 3.4.0 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w
https://nvd.nist.gov/vuln/detail/CVE-2024-47873
https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
https://www.w3.org/TR/xml/#sec-guessing-no-ext-info
|
| phpoffice/phpspreadsheet |
CVE-2024-48917 |
HIGH |
1.21.0 |
1.29.4, 2.1.3, 2.3.2, 3.4.0 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-7cc9-j4mv-vcjp
https://nvd.nist.gov/vuln/detail/CVE-2024-48917
https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
|
| phpoffice/phpspreadsheet |
CVE-2024-56365 |
HIGH |
1.21.0 |
3.7.0, 1.29.7, 2.1.6, 2.3.5 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4#diff-fbb0f53a5c68eeeffaa9ab35552c0b01740396f1a4045af5d2935ec2a62a7816
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jmpx-686v-c3wx
https://nvd.nist.gov/vuln/detail/CVE-2024-56365
|
| phpoffice/phpspreadsheet |
CVE-2024-56366 |
HIGH |
1.21.0 |
3.7.0, 1.29.7, 2.1.6, 2.3.5 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-c6fv-7vh8-2rhr
https://nvd.nist.gov/vuln/detail/CVE-2024-56366
|
| phpoffice/phpspreadsheet |
CVE-2024-56408 |
HIGH |
1.21.0 |
3.7.0, 1.29.7, 2.1.6, 2.3.5 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4
https://github.com/PHPOffice/PhpSpreadsheet/commit/9b9a55c7154daa7cd4095f618933c240508ba3c1
https://github.com/PHPOffice/PhpSpreadsheet/commit/a50ebfe118b3ae0ddaea1c48ac19dc38692f4abc
https://github.com/PHPOffice/PhpSpreadsheet/commit/b8fac55aa5cb7a3d514c7308378bb37bb711b25e
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg
https://nvd.nist.gov/vuln/detail/CVE-2024-56408
|
| phpoffice/phpspreadsheet |
CVE-2024-56409 |
HIGH |
1.21.0 |
3.7.0, 1.29.7, 2.1.6, 2.3.5 |
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-j2xg-cjcx-4677
https://nvd.nist.gov/vuln/detail/CVE-2024-56409
|
| phpoffice/phpspreadsheet |
CVE-2025-54370 |
HIGH |
1.21.0 |
1.30.0, 2.1.0, 2.1.12, 2.3.0, 2.4.0, 3.10.0, 5.0.0 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/phpoffice/phpspreadsheet/CVE-2025-54370.yaml
https://github.com/PHPOffice/PhpSpreadsheet
https://github.com/PHPOffice/PhpSpreadsheet/commit/334a67797ace574d1d37c0992ffe283b7415471a
https://github.com/PHPOffice/PhpSpreadsheet/commit/4050f14521d70634c3320b170236574a6106eb39
https://github.com/PHPOffice/PhpSpreadsheet/commit/81a0de2261f698404587a6421a5c6eb263c40b31
https://github.com/PHPOffice/PhpSpreadsheet/commit/ac4befd2f7ccc21a59daef606a02a3d1828ade09
https://github.com/PHPOffice/PhpSpreadsheet/commit/c2cd0e64392438e4c6af082796eb65c1d629a266
https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-rx7m-68vc-ppxh
https://nvd.nist.gov/vuln/detail/CVE-2025-54370
|
| symfony/http-kernel |
CVE-2022-24894 |
HIGH |
v5.4.4 |
3.4.0, 4.4.50, 5.2.0, 2.1.0, 5.3.0, 5.4.0, 5.4.20, 6.1.12, 6.2.6, 2.3.0, 3.0.0, 4.3.0, 4.4.0, 5.1.0, 2.4.0, 2.7.0, 2.8.0, 3.2.0, 4.0.0, 4.1.0, 4.2.0, 6.0.20, 2.2.0, 2.5.0, 2.6.0, 3.1.0, 3.3.0 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2022-24894.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24894.yaml
https://github.com/symfony/symfony
https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb
https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv
https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html
https://nvd.nist.gov/vuln/detail/CVE-2022-24894
https://symfony.com/cve-2022-24894
https://ubuntu.com/security/notices/USN-7272-1
https://www.cve.org/CVERecord?id=CVE-2022-24894
|
| symfony/process |
CVE-2024-51736 |
CRITICAL |
v5.4.3 |
4.0.0, 5.0.0, 5.3.0, 5.4.46, 6.3.0, 7.1.0, 5.4.0, 6.1.0, 3.0.0, 5.1.0, 5.2.0, 6.2.0, 6.4.0, 7.1.7, 6.4.14 |
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/process/CVE-2024-51736.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2024-51736.yaml
https://github.com/symfony/symfony
https://github.com/symfony/symfony/commit/18ecd03eda3917fdf901a48e72518f911c64a1c9
https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q
https://nvd.nist.gov/vuln/detail/CVE-2024-51736
https://symfony.com/cve-2024-51736
|
| No Misconfigurations found |
| stdlib |
CVE-2023-24538 |
CRITICAL |
v1.20.2 |
1.19.8, 1.20.3 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-24538
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/20374d1d759bc4e17486bde1cb9dca5be37d9e52 (go1.20.3)
https://github.com/golang/go/commit/b1e3ecfa06b67014429a197ec5e134ce4303ad9b (go1.19.8)
https://github.com/golang/go/issues/59234
https://go.dev/cl/482079
https://go.dev/issue/59234
https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
https://linux.oracle.com/cve/CVE-2023-24538.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24538
https://pkg.go.dev/vuln/GO-2023-1703
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20241115-0007/
https://ubuntu.com/security/notices/USN-6038-1
https://ubuntu.com/security/notices/USN-6038-2
https://ubuntu.com/security/notices/USN-6140-1
https://ubuntu.com/security/notices/USN-7061-1
https://www.cve.org/CVERecord?id=CVE-2023-24538
|
| stdlib |
CVE-2023-24540 |
CRITICAL |
v1.20.2 |
1.19.9, 1.20.4 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-24540
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/4a28cad66655ee01c6e944271e23c33cab021765 (go1.20.4)
https://github.com/golang/go/commit/ce7bd33345416e6d8cac901792060591cafc2797 (go1.19.9)
https://github.com/golang/go/issues/59721
https://go.dev/cl/491616
https://go.dev/issue/59721
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
https://linux.oracle.com/cve/CVE-2023-24540.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24540
https://pkg.go.dev/vuln/GO-2023-1752
https://security.netapp.com/advisory/ntap-20241115-0008/
https://ubuntu.com/security/notices/USN-6140-1
https://www.cve.org/CVERecord?id=CVE-2023-24540
|
| stdlib |
CVE-2024-24790 |
CRITICAL |
v1.20.2 |
1.21.11, 1.22.4 |
http://www.openwall.com/lists/oss-security/2024/06/04/1
https://access.redhat.com/errata/RHSA-2025:7256
https://access.redhat.com/security/cve/CVE-2024-24790
https://bugzilla.redhat.com/2237777
https://bugzilla.redhat.com/2237778
https://bugzilla.redhat.com/2279814
https://bugzilla.redhat.com/2292787
https://bugzilla.redhat.com/2295310
https://bugzilla.redhat.com/2315719
https://bugzilla.redhat.com/show_bug.cgi?id=2279814
https://bugzilla.redhat.com/show_bug.cgi?id=2292668
https://bugzilla.redhat.com/show_bug.cgi?id=2292787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790
https://errata.almalinux.org/9/ALSA-2025-7256.html
https://errata.rockylinux.org/RLSA-2024:5291
https://github.com/golang/go/commit/051bdf3fd12a40307606ff9381138039c5f452f0 (1.21)
https://github.com/golang/go/commit/12d5810cdb1f73cf23d7a86462143e9463317fca (1.22)
https://github.com/golang/go/issues/67680
https://go.dev/cl/590316
https://go.dev/issue/67680
https://groups.google.com/g/golang-announce/c/XbxouI9gY7k
https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ
https://linux.oracle.com/cve/CVE-2024-24790.html
https://linux.oracle.com/errata/ELSA-2025-7256.html
https://nvd.nist.gov/vuln/detail/CVE-2024-24790
https://pkg.go.dev/vuln/GO-2024-2887
https://security.netapp.com/advisory/ntap-20240905-0002/
https://ubuntu.com/security/notices/USN-6886-1
https://ubuntu.com/security/notices/USN-7109-1
https://www.cve.org/CVERecord?id=CVE-2024-24790
|
| stdlib |
CVE-2023-24534 |
HIGH |
v1.20.2 |
1.19.8, 1.20.3 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-24534
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/3991f6c41c7dfd167e889234c0cf1d840475e93c (go1.20.3)
https://github.com/golang/go/commit/d6759e7a059f4208f07aa781402841d7ddaaef96 (go1.19.8)
https://go.dev/cl/481994
https://go.dev/issue/58975
https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
https://linux.oracle.com/cve/CVE-2023-24534.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24534
https://pkg.go.dev/vuln/GO-2023-1704
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20230526-0007/
https://ubuntu.com/security/notices/USN-6038-1
https://ubuntu.com/security/notices/USN-6038-2
https://ubuntu.com/security/notices/USN-6140-1
https://www.cve.org/CVERecord?id=CVE-2023-24534
|
| stdlib |
CVE-2023-24536 |
HIGH |
v1.20.2 |
1.19.8, 1.20.3 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-24536
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/7917b5f31204528ea72e0629f0b7d52b35b27538 (go.1.19.8)
https://github.com/golang/go/commit/bf8c7c575c8a552d9d79deb29e80854dc88528d0 (go1.20.3)
https://go.dev/cl/482075
https://go.dev/cl/482076
https://go.dev/cl/482077
https://go.dev/issue/59153
https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
https://linux.oracle.com/cve/CVE-2023-24536.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24536
https://pkg.go.dev/vuln/GO-2023-1705
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20230526-0007/
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2023-24536
|
| stdlib |
CVE-2023-24537 |
HIGH |
v1.20.2 |
1.19.8, 1.20.3 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-24537
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/126a1d02da82f93ede7ce0bd8d3c51ef627f2104 (go1.19.8)
https://github.com/golang/go/commit/e7c4b07ecf6b367f1afc9cc48cde963829dd0aab (go1.20.3)
https://github.com/golang/go/issues/59180
https://go.dev/cl/482078
https://go.dev/issue/59180
https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
https://linux.oracle.com/cve/CVE-2023-24537.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24537
https://pkg.go.dev/vuln/GO-2023-1702
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20241129-0004/
https://ubuntu.com/security/notices/USN-6038-1
https://ubuntu.com/security/notices/USN-6038-2
https://ubuntu.com/security/notices/USN-6140-1
https://www.cve.org/CVERecord?id=CVE-2023-24537
|
| stdlib |
CVE-2023-24539 |
HIGH |
v1.20.2 |
1.19.9, 1.20.4 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-24539
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/090590fdccc8442728aa31601927da1bf2ef1288 (go1.20.4)
https://github.com/golang/go/commit/e49282327b05192e46086bf25fd3ac691205fe80 (go1.19.9)
https://github.com/golang/go/issues/59720
https://go.dev/cl/491615
https://go.dev/issue/59720
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
https://linux.oracle.com/cve/CVE-2023-24539.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24539
https://pkg.go.dev/vuln/GO-2023-1751
https://security.netapp.com/advisory/ntap-20241129-0005/
https://ubuntu.com/security/notices/USN-6140-1
https://www.cve.org/CVERecord?id=CVE-2023-24539
|
| stdlib |
CVE-2023-29400 |
HIGH |
v1.20.2 |
1.19.9, 1.20.4 |
https://access.redhat.com/errata/RHSA-2023:6474
https://access.redhat.com/security/cve/CVE-2023-29400
https://bugzilla.redhat.com/2174485
https://bugzilla.redhat.com/2178358
https://bugzilla.redhat.com/2178488
https://bugzilla.redhat.com/2178492
https://bugzilla.redhat.com/2184481
https://bugzilla.redhat.com/2184482
https://bugzilla.redhat.com/2184483
https://bugzilla.redhat.com/2184484
https://bugzilla.redhat.com/2196026
https://bugzilla.redhat.com/2196027
https://bugzilla.redhat.com/2196029
https://bugzilla.redhat.com/2222167
https://bugzilla.redhat.com/2228689
https://errata.almalinux.org/9/ALSA-2023-6474.html
https://github.com/golang/go/commit/337dd75343145b74ed2073d793322eb4103b56ad (go1.20.4)
https://github.com/golang/go/commit/9db0e74f606b8afb28cc71d4b1c8b4ed24cabbf5 (go1.19.9)
https://github.com/golang/go/issues/59722
https://go.dev/cl/491617
https://go.dev/issue/59722
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
https://linux.oracle.com/cve/CVE-2023-29400.html
https://linux.oracle.com/errata/ELSA-2023-6939.html
https://nvd.nist.gov/vuln/detail/CVE-2023-29400
https://pkg.go.dev/vuln/GO-2023-1753
https://security.netapp.com/advisory/ntap-20241213-0005/
https://ubuntu.com/security/notices/USN-6140-1
https://www.cve.org/CVERecord?id=CVE-2023-29400
|
| stdlib |
CVE-2023-29403 |
HIGH |
v1.20.2 |
1.19.10, 1.20.5 |
https://access.redhat.com/errata/RHSA-2023:3923
https://access.redhat.com/security/cve/CVE-2023-29403
https://bugzilla.redhat.com/2216965
https://bugzilla.redhat.com/2217562
https://bugzilla.redhat.com/2217565
https://bugzilla.redhat.com/2217569
https://bugzilla.redhat.com/show_bug.cgi?id=2216965
https://bugzilla.redhat.com/show_bug.cgi?id=2217562
https://bugzilla.redhat.com/show_bug.cgi?id=2217565
https://bugzilla.redhat.com/show_bug.cgi?id=2217569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405
https://errata.almalinux.org/9/ALSA-2023-3923.html
https://errata.rockylinux.org/RLSA-2023:3923
https://github.com/golang/go/commit/36144ba429ef2650940c72e7a0b932af3612d420 (go1.20.5)
https://github.com/golang/go/commit/a7b1cd452ddc69a6606c2f35ac5786dc892e62cb (go1.19.10)
https://github.com/golang/go/issues/60272
https://go.dev/cl/501223
https://go.dev/issue/60272
https://groups.google.com/g/golang-announce/c/q5135a9d924
https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ
https://linux.oracle.com/cve/CVE-2023-29403.html
https://linux.oracle.com/errata/ELSA-2023-3923.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/
https://nvd.nist.gov/vuln/detail/CVE-2023-29403
https://pkg.go.dev/vuln/GO-2023-1840
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20241220-0009/
https://ubuntu.com/security/notices/USN-7061-1
https://ubuntu.com/security/notices/USN-7109-1
https://www.cve.org/CVERecord?id=CVE-2023-29403
|
| stdlib |
CVE-2023-39325 |
HIGH |
v1.20.2 |
1.20.10, 1.21.3 |
golang.org/x/net
https://access.redhat.com/errata/RHSA-2023:6077
https://access.redhat.com/security/cve/CVE-2023-39325
https://access.redhat.com/security/cve/CVE-2023-44487
https://bugzilla.redhat.com/2242803
https://bugzilla.redhat.com/2243296
https://bugzilla.redhat.com/show_bug.cgi?id=2242803
https://bugzilla.redhat.com/show_bug.cgi?id=2243296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
https://errata.almalinux.org/9/ALSA-2023-6077.html
https://errata.rockylinux.org/RLSA-2023:5863
https://github.com/golang/go/commit/24ae2d927285c697440fdde3ad7f26028354bcf3 [golang- 1.21]
https://github.com/golang/go/commit/e175f27f58aa7b9cd4d79607ae65d2cd5baaee68 [golang-1.20]
https://github.com/golang/go/issues/63417
https://go.dev/cl/534215
https://go.dev/cl/534235
https://go.dev/issue/63417
https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
https://linux.oracle.com/cve/CVE-2023-39325.html
https://linux.oracle.com/errata/ELSA-2023-5867.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/
https://nvd.nist.gov/vuln/detail/CVE-2023-39325
https://pkg.go.dev/vuln/GO-2023-2102
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20231110-0008
https://security.netapp.com/advisory/ntap-20231110-0008/
https://ubuntu.com/security/notices/USN-6574-1
https://ubuntu.com/security/notices/USN-7061-1
https://ubuntu.com/security/notices/USN-7109-1
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
https://www.cve.org/CVERecord?id=CVE-2023-39325
|
| stdlib |
CVE-2023-45283 |
HIGH |
v1.20.2 |
1.20.11, 1.21.4, 1.20.12, 1.21.5 |
http://www.openwall.com/lists/oss-security/2023/12/05/2
https://go.dev/cl/540277
https://go.dev/cl/541175
https://go.dev/issue/63713
https://go.dev/issue/64028
https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
https://nvd.nist.gov/vuln/detail/CVE-2023-45283
https://pkg.go.dev/vuln/GO-2023-2185
https://security.netapp.com/advisory/ntap-20231214-0008/
|
| stdlib |
CVE-2023-45288 |
HIGH |
v1.20.2 |
1.21.9, 1.22.2 |
http://www.openwall.com/lists/oss-security/2024/04/03/16
http://www.openwall.com/lists/oss-security/2024/04/05/4
https://access.redhat.com/errata/RHSA-2024:2724
https://access.redhat.com/security/cve/CVE-2023-45288
https://bugzilla.redhat.com/2268017
https://bugzilla.redhat.com/2268018
https://bugzilla.redhat.com/2268019
https://bugzilla.redhat.com/2268273
https://bugzilla.redhat.com/show_bug.cgi?id=2268017
https://bugzilla.redhat.com/show_bug.cgi?id=2268018
https://bugzilla.redhat.com/show_bug.cgi?id=2268019
https://bugzilla.redhat.com/show_bug.cgi?id=2268273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24783
https://errata.almalinux.org/9/ALSA-2024-2724.html
https://errata.rockylinux.org/RLSA-2024:3346
https://go.dev/cl/576155
https://go.dev/issue/65051
https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
https://kb.cert.org/vuls/id/421644
https://linux.oracle.com/cve/CVE-2023-45288.html
https://linux.oracle.com/errata/ELSA-2024-3346.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
https://nowotarski.info/http2-continuation-flood-technical-details
https://nowotarski.info/http2-continuation-flood/
https://nvd.nist.gov/vuln/detail/CVE-2023-45288
https://pkg.go.dev/vuln/GO-2024-2687
https://security.netapp.com/advisory/ntap-20240419-0009
https://security.netapp.com/advisory/ntap-20240419-0009/
https://ubuntu.com/security/notices/USN-6886-1
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2023-45288
https://www.kb.cert.org/vuls/id/421644
|
| stdlib |
CVE-2024-34156 |
HIGH |
v1.20.2 |
1.22.7, 1.23.1 |
https://access.redhat.com/errata/RHSA-2025:3773
https://access.redhat.com/security/cve/CVE-2024-34156
https://bugzilla.redhat.com/2310528
https://bugzilla.redhat.com/show_bug.cgi?id=2262921
https://bugzilla.redhat.com/show_bug.cgi?id=2310528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156
https://errata.almalinux.org/9/ALSA-2025-3773.html
https://errata.rockylinux.org/RLSA-2024:7262
https://github.com/golang/go/commit/2092294f2b097c5828f4eace6c98a322c1510b01 (go1.22.7)
https://github.com/golang/go/commit/fa8ff1a46deb6c816304441ec6740ec112e19012 (go1.23.1)
https://go.dev/cl/611239
https://go.dev/issue/69139
https://groups.google.com/g/golang-announce/c/K-cEzDeCtpc
https://groups.google.com/g/golang-dev/c/S9POB9NCTdk
https://linux.oracle.com/cve/CVE-2024-34156.html
https://linux.oracle.com/errata/ELSA-2025-3773.html
https://nvd.nist.gov/vuln/detail/CVE-2024-34156
https://pkg.go.dev/vuln/GO-2024-3106
https://security.netapp.com/advisory/ntap-20240926-0004/
https://ubuntu.com/security/notices/USN-7081-1
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2024-34156
|
| stdlib |
CVE-2025-47907 |
HIGH |
v1.20.2 |
1.23.12, 1.24.6 |
https://access.redhat.com/security/cve/CVE-2025-47907
https://go.dev/cl/693735
https://go.dev/issue/74831
https://groups.google.com/g/golang-announce/c/x5MKroML2yM
https://nvd.nist.gov/vuln/detail/CVE-2025-47907
https://pkg.go.dev/vuln/GO-2025-3849
https://www.cve.org/CVERecord?id=CVE-2025-47907
|
| No Misconfigurations found |
| No Vulnerabilities found |
| No Misconfigurations found |