docker.io/bridgecrew/checkov (debian 13.2)¶ Trivy Image Scan Image: docker.io/bridgecrew/checkov (debian 13.2) Scan date: 2025-12-14 docker.io/bridgecrew/checkov (debian 13.2) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.37-2+b5 no fix available bsdutils CVE-2025-14104 MEDIUM 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 bsdutils CVE-2022-0563 LOW 1:2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 coreutils CVE-2017-18018 LOW 9.7-3 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 coreutils CVE-2025-5278 LOW 9.7-3 no fix available http://www.openwall.com/lists/oss-security/2025/05/27/2 http://www.openwall.com/lists/oss-security/2025/05/29/1 http://www.openwall.com/lists/oss-security/2025/05/29/2 https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://security-tracker.debian.org/tracker/CVE-2025-5278 https://www.cve.org/CVERecord?id=CVE-2025-5278 git CVE-2018-1000021 LOW 1:2.47.3-0+deb13u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://www.cve.org/CVERecord?id=CVE-2018-1000021 git CVE-2022-24975 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git CVE-2024-52005 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/errata/RHSA-2025:7409 https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/2338289 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005 https://errata.almalinux.org/9/ALSA-2025-7409.html https://errata.rockylinux.org/RLSA-2025:7482 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://linux.oracle.com/cve/CVE-2024-52005.html https://linux.oracle.com/errata/ELSA-2025-8414.html https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://lore.kernel.org/git/8570a129-d66a-465a-905e-0a077c69c409@gmail.com/T/#t https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://www.cve.org/CVERecord?id=CVE-2024-52005 git-man CVE-2018-1000021 LOW 1:2.47.3-0+deb13u1 no fix available http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://nvd.nist.gov/vuln/detail/CVE-2018-1000021 https://www.cve.org/CVERecord?id=CVE-2018-1000021 git-man CVE-2022-24975 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/security/cve/CVE-2022-24975 https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191 https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/ https://nvd.nist.gov/vuln/detail/CVE-2022-24975 https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/ https://www.cve.org/CVERecord?id=CVE-2022-24975 https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/ git-man CVE-2024-52005 LOW 1:2.47.3-0+deb13u1 no fix available https://access.redhat.com/errata/RHSA-2025:7409 https://access.redhat.com/security/cve/CVE-2024-52005 https://bugzilla.redhat.com/2338289 https://bugzilla.redhat.com/show_bug.cgi?id=2338289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005 https://errata.almalinux.org/9/ALSA-2025-7409.html https://errata.rockylinux.org/RLSA-2025:7482 https://github.com/git/git/security/advisories/GHSA-7jjc-gg6m-3329 https://linux.oracle.com/cve/CVE-2024-52005.html https://linux.oracle.com/errata/ELSA-2025-8414.html https://lore.kernel.org/git/1M9FnZ-1taoNo1wwh-00ESSd@mail.gmx.net https://lore.kernel.org/git/8570a129-d66a-465a-905e-0a077c69c409@gmail.com/T/#t https://nvd.nist.gov/vuln/detail/CVE-2024-52005 https://www.cve.org/CVERecord?id=CVE-2024-52005 libapt-pkg7.0 CVE-2011-3374 LOW 3.0.3 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libblkid1 CVE-2025-14104 MEDIUM 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 libblkid1 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libc-bin CVE-2010-4756 LOW 2.41-12 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.41-12 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.41-12 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc-bin CVE-2019-1010023 LOW 2.41-12 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc-bin CVE-2019-1010024 LOW 2.41-12 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc-bin CVE-2019-1010025 LOW 2.41-12 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc-bin CVE-2019-9192 LOW 2.41-12 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libc6 CVE-2010-4756 LOW 2.41-12 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc6 CVE-2018-20796 LOW 2.41-12 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc6 CVE-2019-1010022 LOW 2.41-12 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc6 CVE-2019-1010023 LOW 2.41-12 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc6 CVE-2019-1010024 LOW 2.41-12 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc6 CVE-2019-1010025 LOW 2.41-12 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc6 CVE-2019-9192 LOW 2.41-12 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libcurl3t64-gnutls CVE-2025-10966 LOW 8.14.1-2+deb13u2 no fix available http://www.openwall.com/lists/oss-security/2025/11/05/2 https://access.redhat.com/security/cve/CVE-2025-10966 https://curl.se/docs/CVE-2025-10966.html https://curl.se/docs/CVE-2025-10966.json https://github.com/curl/curl/commit/b011e3fcfb06d6c027859 https://hackerone.com/reports/3355218 https://nvd.nist.gov/vuln/detail/CVE-2025-10966 https://www.cve.org/CVERecord?id=CVE-2025-10966 libexpat1 CVE-2025-59375 MEDIUM 2.7.1-2 no fix available http://www.openwall.com/lists/oss-security/2025/09/16/2 https://access.redhat.com/errata/RHSA-2025:22175 https://access.redhat.com/security/cve/CVE-2025-59375 https://bugzilla.redhat.com/2395108 https://bugzilla.redhat.com/show_bug.cgi?id=2395108 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375 https://errata.almalinux.org/9/ALSA-2025-22175.html https://errata.rockylinux.org/RLSA-2025:19403 https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74 https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes https://github.com/libexpat/libexpat/issues/1018 https://github.com/libexpat/libexpat/pull/1034 https://issues.oss-fuzz.com/issues/439133977 https://linux.oracle.com/cve/CVE-2025-59375.html https://linux.oracle.com/errata/ELSA-2025-22175.html https://nvd.nist.gov/vuln/detail/CVE-2025-59375 https://www.cve.org/CVERecord?id=CVE-2025-59375 libexpat1 CVE-2025-66382 LOW 2.7.1-2 no fix available http://www.openwall.com/lists/oss-security/2025/12/02/1 https://access.redhat.com/security/cve/CVE-2025-66382 https://github.com/libexpat/libexpat/issues/1076 https://nvd.nist.gov/vuln/detail/CVE-2025-66382 https://www.cve.org/CVERecord?id=CVE-2025-66382 libgnutls30t64 CVE-2011-3389 LOW 3.8.9-3 no fix available http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/ http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx http://curl.haxx.se/docs/adv_20120124B.html http://downloads.asterisk.org/pub/security/AST-2016-001.html http://ekoparty.org/2011/juliano-rizzo.php http://eprint.iacr.org/2004/111 http://eprint.iacr.org/2006/136 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=132872385320240&w=2 http://marc.info/?l=bugtraq&m=133365109612558&w=2 http://marc.info/?l=bugtraq&m=133728004526190&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue http://osvdb.org/74829 http://rhn.redhat.com/errata/RHSA-2012-0508.html http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/45791 http://secunia.com/advisories/47998 http://secunia.com/advisories/48256 http://secunia.com/advisories/48692 http://secunia.com/advisories/48915 http://secunia.com/advisories/48948 http://secunia.com/advisories/49198 http://secunia.com/advisories/55322 http://secunia.com/advisories/55350 http://secunia.com/advisories/55351 http://security.gentoo.org/glsa/glsa-201203-02.xml http://security.gentoo.org/glsa/glsa-201406-32.xml http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5001 http://support.apple.com/kb/HT5130 http://support.apple.com/kb/HT5281 http://support.apple.com/kb/HT5501 http://support.apple.com/kb/HT6150 http://technet.microsoft.com/security/advisory/2588513 http://vnhacker.blogspot.com/2011/09/beast.html http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf http://www.debian.org/security/2012/dsa-2398 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.imperialviolet.org/2011/09/23/chromeandbeast.html http://www.insecure.cl/Beast-SSL.rar http://www.kb.cert.org/vuls/id/864643 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 http://www.opera.com/docs/changelogs/mac/1151/ http://www.opera.com/docs/changelogs/mac/1160/ http://www.opera.com/docs/changelogs/unix/1151/ http://www.opera.com/docs/changelogs/unix/1160/ http://www.opera.com/docs/changelogs/windows/1151/ http://www.opera.com/docs/changelogs/windows/1160/ http://www.opera.com/support/kb/view/1004/ http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://www.redhat.com/support/errata/RHSA-2011-1384.html http://www.redhat.com/support/errata/RHSA-2012-0006.html http://www.securityfocus.com/bid/49388 http://www.securityfocus.com/bid/49778 http://www.securitytracker.com/id/1029190 http://www.securitytracker.com/id?1025997 http://www.securitytracker.com/id?1026103 http://www.securitytracker.com/id?1026704 http://www.ubuntu.com/usn/USN-1263-1 http://www.us-cert.gov/cas/techalerts/TA12-010A.html https://access.redhat.com/security/cve/CVE-2011-3389 https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail https://bugzilla.novell.com/show_bug.cgi?id=719047 https://bugzilla.redhat.com/show_bug.cgi?id=737506 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 https://hermes.opensuse.org/messages/13154861 https://hermes.opensuse.org/messages/13155432 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://linux.oracle.com/cve/CVE-2011-3389.html https://linux.oracle.com/errata/ELSA-2011-1380.html https://nvd.nist.gov/vuln/detail/CVE-2011-3389 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 https://ubuntu.com/security/notices/USN-1263-1 https://www.cve.org/CVERecord?id=CVE-2011-3389 libgnutls30t64 CVE-2025-9820 UNKNOWN 3.8.9-3 no fix available libgssapi-krb5-2 CVE-2018-5709 LOW 1.21.3-5 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 libgssapi-krb5-2 CVE-2024-26458 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md https://linux.oracle.com/cve/CVE-2024-26458.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.netapp.com/advisory/ntap-20240415-0010/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26458 libgssapi-krb5-2 CVE-2024-26461 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md https://linux.oracle.com/cve/CVE-2024-26461.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.netapp.com/advisory/ntap-20240415-0011/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26461 libk5crypto3 CVE-2018-5709 LOW 1.21.3-5 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 libk5crypto3 CVE-2024-26458 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md https://linux.oracle.com/cve/CVE-2024-26458.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.netapp.com/advisory/ntap-20240415-0010/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26458 libk5crypto3 CVE-2024-26461 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md https://linux.oracle.com/cve/CVE-2024-26461.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.netapp.com/advisory/ntap-20240415-0011/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26461 libkrb5-3 CVE-2018-5709 LOW 1.21.3-5 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 libkrb5-3 CVE-2024-26458 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md https://linux.oracle.com/cve/CVE-2024-26458.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.netapp.com/advisory/ntap-20240415-0010/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26458 libkrb5-3 CVE-2024-26461 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md https://linux.oracle.com/cve/CVE-2024-26461.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.netapp.com/advisory/ntap-20240415-0011/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26461 libkrb5support0 CVE-2018-5709 LOW 1.21.3-5 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 libkrb5support0 CVE-2024-26458 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md https://linux.oracle.com/cve/CVE-2024-26458.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.netapp.com/advisory/ntap-20240415-0010/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26458 libkrb5support0 CVE-2024-26461 LOW 1.21.3-5 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md https://linux.oracle.com/cve/CVE-2024-26461.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.netapp.com/advisory/ntap-20240415-0011/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26461 liblastlog2-2 CVE-2025-14104 MEDIUM 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2025-14104 https://bugzilla.redhat.com/show_bug.cgi?id=2419369 https://nvd.nist.gov/vuln/detail/CVE-2025-14104 https://www.cve.org/CVERecord?id=CVE-2025-14104 liblastlog2-2 CVE-2022-0563 LOW 2.41-5 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libldap2 CVE-2015-3276 LOW 2.6.10+dfsg-1 no fix available http://rhn.redhat.com/errata/RHSA-2015-2131.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securitytracker.com/id/1034221 https://access.redhat.com/security/cve/CVE-2015-3276 https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://linux.oracle.com/cve/CVE-2015-3276.html https://linux.oracle.com/errata/ELSA-2015-2131.html https://nvd.nist.gov/vuln/detail/CVE-2015-3276 https://www.cve.org/CVERecord?id=CVE-2015-3276 libldap2 CVE-2017-14159 LOW 2.6.10+dfsg-1 no fix available http://www.openldap.org/its/index.cgi?findid=8703 https://access.redhat.com/security/cve/CVE-2017-14159 https://nvd.nist.gov/vuln/detail/CVE-2017-14159 https://www.cve.org/CVERecord?id=CVE-2017-14159 https://www.oracle.com/security-alerts/cpuapr2022.html 51 other vulnerabilities found... No Misconfigurations found Python (python-pkg)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links pip CVE-2025-8869 MEDIUM 24.0 25.3 https://access.redhat.com/security/cve/CVE-2025-8869 https://github.com/pypa/pip https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip/pull/13550 https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN/ https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://pip.pypa.io/en/stable/news/#v25-2 https://www.cve.org/CVERecord?id=CVE-2025-8869 urllib3 CVE-2025-66418 HIGH 2.2.2 2.6.0 https://github.com/urllib3/urllib3 https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8 https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53 https://nvd.nist.gov/vuln/detail/CVE-2025-66418 https://ubuntu.com/security/notices/USN-7927-1 https://www.cve.org/CVERecord?id=CVE-2025-66418 https://www.openwall.com/lists/oss-security/2025/12/05/4 urllib3 CVE-2025-66471 HIGH 2.2.2 2.6.0 https://github.com/urllib3/urllib3 https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7 https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37 https://nvd.nist.gov/vuln/detail/CVE-2025-66471 https://ubuntu.com/security/notices/USN-7927-1 https://www.cve.org/CVERecord?id=CVE-2025-66471 https://www.openwall.com/lists/oss-security/2025/12/05/4 urllib3 CVE-2025-50181 MEDIUM 2.2.2 2.5.0 https://access.redhat.com/security/cve/CVE-2025-50181 https://github.com/urllib3/urllib3 https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857 https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v https://nvd.nist.gov/vuln/detail/CVE-2025-50181 https://ubuntu.com/security/notices/USN-7599-1 https://ubuntu.com/security/notices/USN-7599-2 https://www.cve.org/CVERecord?id=CVE-2025-50181 urllib3 CVE-2025-50182 MEDIUM 2.2.2 2.5.0 https://access.redhat.com/security/cve/CVE-2025-50182 https://github.com/urllib3/urllib3 https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5 https://nvd.nist.gov/vuln/detail/CVE-2025-50182 https://ubuntu.com/security/notices/USN-7599-1 https://www.cve.org/CVERecord?id=CVE-2025-50182 No Misconfigurations found usr/bin/kustomize (gobinary)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links stdlib CVE-2025-22874 HIGH v1.24.0 1.24.4 https://access.redhat.com/security/cve/CVE-2025-22874 https://go.dev/cl/670375 https://go.dev/issue/73612 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://nvd.nist.gov/vuln/detail/CVE-2025-22874 https://pkg.go.dev/vuln/GO-2025-3749 https://www.cve.org/CVERecord?id=CVE-2025-22874 stdlib CVE-2025-47907 HIGH v1.24.0 1.23.12, 1.24.6 http://www.openwall.com/lists/oss-security/2025/08/06/1 https://access.redhat.com/errata/RHSA-2025:20909 https://access.redhat.com/security/cve/CVE-2025-47907 https://bugzilla.redhat.com/2387083 https://bugzilla.redhat.com/2393152 https://errata.almalinux.org/9/ALSA-2025-20909.html https://go.dev/cl/693735 https://go.dev/issue/74831 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://linux.oracle.com/cve/CVE-2025-47907.html https://linux.oracle.com/errata/ELSA-2025-20983.html https://nvd.nist.gov/vuln/detail/CVE-2025-47907 https://pkg.go.dev/vuln/GO-2025-3849 https://www.cve.org/CVERecord?id=CVE-2025-47907 stdlib CVE-2025-58183 HIGH v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/errata/RHSA-2025:22011 https://access.redhat.com/security/cve/CVE-2025-58183 https://bugzilla.redhat.com/2404715 https://bugzilla.redhat.com/2407258 https://bugzilla.redhat.com/show_bug.cgi?id=2407258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183 https://errata.almalinux.org/9/ALSA-2025-22011.html https://errata.rockylinux.org/RLSA-2025:23088 https://go.dev/cl/709861 https://go.dev/issue/75677 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://linux.oracle.com/cve/CVE-2025-58183.html https://linux.oracle.com/errata/ELSA-2025-23088.html https://nvd.nist.gov/vuln/detail/CVE-2025-58183 https://pkg.go.dev/vuln/GO-2025-4014 https://www.cve.org/CVERecord?id=CVE-2025-58183 stdlib CVE-2025-58186 HIGH v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://go.dev/cl/709855 https://go.dev/issue/75672 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58186 https://pkg.go.dev/vuln/GO-2025-4012 stdlib CVE-2025-58187 HIGH v1.24.0 1.24.9, 1.25.3 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://go.dev/cl/709854 https://go.dev/issue/75681 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58187 https://pkg.go.dev/vuln/GO-2025-4007 stdlib CVE-2025-61729 HIGH v1.24.0 1.24.11, 1.25.5 https://access.redhat.com/security/cve/CVE-2025-61729 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://pkg.go.dev/vuln/GO-2025-4155 https://www.cve.org/CVERecord?id=CVE-2025-61729 stdlib CVE-2025-0913 MEDIUM v1.24.0 1.23.10, 1.24.4 https://go.dev/cl/672396 https://go.dev/issue/73702 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://nvd.nist.gov/vuln/detail/CVE-2025-0913 https://pkg.go.dev/vuln/GO-2025-3750 stdlib CVE-2025-22871 MEDIUM v1.24.0 1.23.8, 1.24.2 http://www.openwall.com/lists/oss-security/2025/04/04/4 https://access.redhat.com/errata/RHSA-2025:9635 https://access.redhat.com/security/cve/CVE-2025-22871 https://bugzilla.redhat.com/2358493 https://bugzilla.redhat.com/show_bug.cgi?id=2358493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871 https://errata.almalinux.org/9/ALSA-2025-9635.html https://errata.rockylinux.org/RLSA-2025:9317 https://github.com/roadrunner-server/roadrunner https://github.com/roadrunner-server/roadrunner/commit/f269279ee87d0b88127741cad1042389af7605fa https://github.com/roadrunner-server/roadrunner/issues/2166 https://github.com/roadrunner-server/roadrunner/releases/tag/v2025.1.0 https://go.dev/cl/652998 https://go.dev/issue/71988 https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk https://linux.oracle.com/cve/CVE-2025-22871.html https://linux.oracle.com/errata/ELSA-2025-9845.html https://nvd.nist.gov/vuln/detail/CVE-2025-22871 https://pkg.go.dev/vuln/GO-2025-3563 https://www.cve.org/CVERecord?id=CVE-2025-22871 stdlib CVE-2025-4673 MEDIUM v1.24.0 1.23.10, 1.24.4 https://access.redhat.com/errata/RHSA-2025:15887 https://access.redhat.com/security/cve/CVE-2025-4673 https://bugzilla.redhat.com/2373305 https://bugzilla.redhat.com/show_bug.cgi?id=2373305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4673 https://errata.almalinux.org/9/ALSA-2025-15887.html https://errata.rockylinux.org/RLSA-2025:16432 https://go.dev/cl/679257 https://go.dev/issue/73816 https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A https://linux.oracle.com/cve/CVE-2025-4673.html https://linux.oracle.com/errata/ELSA-2025-10677.html https://nvd.nist.gov/vuln/detail/CVE-2025-4673 https://pkg.go.dev/vuln/GO-2025-3751 https://ubuntu.com/security/notices/USN-7574-1 https://www.cve.org/CVERecord?id=CVE-2025-4673 stdlib CVE-2025-47906 MEDIUM v1.24.0 1.23.12, 1.24.6 http://www.openwall.com/lists/oss-security/2025/08/06/1 https://access.redhat.com/errata/RHSA-2025:22005 https://access.redhat.com/security/cve/CVE-2025-47906 https://bugzilla.redhat.com/2396546 https://bugzilla.redhat.com/show_bug.cgi?id=2396546 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47906 https://errata.almalinux.org/9/ALSA-2025-22005.html https://errata.rockylinux.org/RLSA-2025:22005 https://go.dev/cl/691775 https://go.dev/issue/74466 https://groups.google.com/g/golang-announce/c/x5MKroML2yM https://linux.oracle.com/cve/CVE-2025-47906.html https://linux.oracle.com/errata/ELSA-2025-22668.html https://nvd.nist.gov/vuln/detail/CVE-2025-47906 https://pkg.go.dev/vuln/GO-2025-3956 https://www.cve.org/CVERecord?id=CVE-2025-47906 stdlib CVE-2025-47912 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-47912 https://go.dev/cl/709857 https://go.dev/issue/75678 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-47912 https://pkg.go.dev/vuln/GO-2025-4010 https://www.cve.org/CVERecord?id=CVE-2025-47912 stdlib CVE-2025-58185 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58185 https://github.com/golang/go/commit/8709a41d5ef7321f486a1857f189c3fee20e8edd https://go.dev/cl/709856 https://go.dev/issue/75671 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58185 https://pkg.go.dev/vuln/GO-2025-4011 https://www.cve.org/CVERecord?id=CVE-2025-58185 stdlib CVE-2025-58188 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58188 https://github.com/golang/go/commit/6e4007e8cffbb870e6b606307ab7308236ecefb9 https://go.dev/cl/709853 https://go.dev/issue/75675 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58188 https://pkg.go.dev/vuln/GO-2025-4013 https://www.cve.org/CVERecord?id=CVE-2025-58188 stdlib CVE-2025-58189 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-58189 https://go.dev/cl/707776 https://go.dev/issue/75652 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-58189 https://pkg.go.dev/vuln/GO-2025-4008 https://www.cve.org/CVERecord?id=CVE-2025-58189 stdlib CVE-2025-61723 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-61723 https://github.com/golang/go/commit/5ce8cd16f3859ec5ac4106ad8ec15d6236f4501b https://go.dev/cl/709858 https://go.dev/issue/75676 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-61723 https://pkg.go.dev/vuln/GO-2025-4009 https://www.cve.org/CVERecord?id=CVE-2025-61723 stdlib CVE-2025-61724 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-61724 https://go.dev/cl/709859 https://go.dev/issue/75716 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-61724 https://pkg.go.dev/vuln/GO-2025-4015 https://www.cve.org/CVERecord?id=CVE-2025-61724 stdlib CVE-2025-61725 MEDIUM v1.24.0 1.24.8, 1.25.2 http://www.openwall.com/lists/oss-security/2025/10/08/1 https://access.redhat.com/security/cve/CVE-2025-61725 https://go.dev/cl/709860 https://go.dev/issue/75680 https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI https://nvd.nist.gov/vuln/detail/CVE-2025-61725 https://pkg.go.dev/vuln/GO-2025-4006 https://www.cve.org/CVERecord?id=CVE-2025-61725 stdlib CVE-2025-61727 MEDIUM v1.24.0 1.24.11, 1.25.5 https://go.dev/cl/723900 https://go.dev/issue/76442 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://nvd.nist.gov/vuln/detail/CVE-2025-61727 https://pkg.go.dev/vuln/GO-2025-4175 No Misconfigurations found usr/local/bin/helm (gobinary)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links golang.org/x/crypto CVE-2025-47914 MEDIUM v0.43.0 0.45.0 https://go.dev/cl/721960 https://go.dev/issue/76364 https://go.googlesource.com/crypto https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA https://nvd.nist.gov/vuln/detail/CVE-2025-47914 https://pkg.go.dev/vuln/GO-2025-4135 golang.org/x/crypto CVE-2025-58181 MEDIUM v0.43.0 0.45.0 https://go.dev/cl/721961 https://go.dev/issue/76363 https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA https://nvd.nist.gov/vuln/detail/CVE-2025-58181 https://pkg.go.dev/vuln/GO-2025-4134 stdlib CVE-2025-61729 HIGH v1.24.9 1.24.11, 1.25.5 https://access.redhat.com/security/cve/CVE-2025-61729 https://go.dev/cl/725920 https://go.dev/issue/76445 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://nvd.nist.gov/vuln/detail/CVE-2025-61729 https://pkg.go.dev/vuln/GO-2025-4155 https://www.cve.org/CVERecord?id=CVE-2025-61729 stdlib CVE-2025-61727 MEDIUM v1.24.9 1.24.11, 1.25.5 https://go.dev/cl/723900 https://go.dev/issue/76442 https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 https://nvd.nist.gov/vuln/detail/CVE-2025-61727 https://pkg.go.dev/vuln/GO-2025-4175 No Misconfigurations found