| apt | CVE-2011-3374 | LOW | 1.8.2.3 |  | Expand...https://access.redhat.com/security/cve/cve-2011-3374https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
 https://seclists.org/fulldisclosure/2011/Sep/221
 https://security-tracker.debian.org/tracker/CVE-2011-3374
 https://snyk.io/vuln/SNYK-LINUX-APT-116518
 https://ubuntu.com/security/CVE-2011-3374
 
 | 
  | bash | CVE-2019-18276 | LOW | 5.0-4 |  | Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
 https://linux.oracle.com/cve/CVE-2019-18276.html
 https://linux.oracle.com/errata/ELSA-2021-1679.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security.gentoo.org/glsa/202105-34
 https://security.netapp.com/advisory/ntap-20200430-0003/
 https://www.youtube.com/watch?v=-wGtxJ8opa8
 
 | 
  | bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | coreutils | CVE-2016-2781 | LOW | 8.30-3 |  | Expand...http://seclists.org/oss-sec/2016/q1/452http://www.openwall.com/lists/oss-security/2016/02/28/2
 http://www.openwall.com/lists/oss-security/2016/02/28/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lore.kernel.org/patchwork/patch/793178/
 
 | 
  | coreutils | CVE-2017-18018 | LOW | 8.30-3 |  | Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
 | 
  | curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22946.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22947.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22922.htmlhttps://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22923.htmlhttps://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22924.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 |  | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markuphttps://www.gnu.org/software/gcc/gcc-8/changes.html
 
 | 
  | gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
 https://linux.oracle.com/cve/CVE-2019-15847.html
 https://linux.oracle.com/errata/ELSA-2020-1864.html
 
 | 
  | gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
 https://dev.gnupg.org/T4755
 https://eprint.iacr.org/2020/014.pdf
 https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
 https://rwc.iacr.org/2020/slides/Leurent.pdf
 https://ubuntu.com/security/notices/USN-4516-1
 https://usn.ubuntu.com/4516-1/
 
 | 
  | imagemagick-6-common | CVE-2020-19667 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667https://github.com/ImageMagick/ImageMagick/issues/1895
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27752 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894226https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
 
 | 
  | imagemagick-6-common | CVE-2020-27766 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-29599 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599https://github.com/ImageMagick/ImageMagick/discussions/2851
 https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
 https://linux.oracle.com/cve/CVE-2020-29599.html
 https://linux.oracle.com/errata/ELSA-2021-0024.html
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://security.gentoo.org/glsa/202101-36
 
 | 
  | imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891605https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
 
 | 
  | imagemagick-6-common | CVE-2020-25665 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-25674 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-25676 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891934https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27750 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891984https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27756 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894233https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27760 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894239https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27762 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894680https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27770 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2021-20176 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1916610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-3596 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970569https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
 https://github.com/ImageMagick/ImageMagick/issues/2624
 
 | 
  | imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick-6-common | CVE-2019-13310 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
 https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
 https://github.com/ImageMagick/ImageMagick/issues/1616
 https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
 https://linux.oracle.com/cve/CVE-2019-13310.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4192-1
 https://usn.ubuntu.com/4192-1/
 
 | 
  | imagemagick-6-common | CVE-2019-16709 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
 http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
 https://github.com/ImageMagick/ImageMagick/issues/1531
 https://linux.oracle.com/cve/CVE-2019-16709.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4192-1
 https://usn.ubuntu.com/4192-1/
 
 | 
  | imagemagick-6-common | CVE-2020-10251 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/1859
 | 
  | imagemagick-6-common | CVE-2020-25666 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-25675 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891933https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27560 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560
 https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4670-1
 
 | 
  | imagemagick-6-common | CVE-2020-27751 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891994https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27753 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894229https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894231https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27757 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894234https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27758 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894236https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27759 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894238https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27761 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894679https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27763 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894682https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27764 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5https://bugzilla.redhat.com/show_bug.cgi?id=1894683
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
 https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27765 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894684https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27767 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27768 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27769 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
 https://github.com/ImageMagick/ImageMagick/issues/1740
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27771 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898290https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27772 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898291https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27773 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898295https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27774 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898296https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27775 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898300https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2020-27776 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 |  | Expand...https://access.redhat.com/security/cve/cve-2011-3374https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
 https://seclists.org/fulldisclosure/2011/Sep/221
 https://security-tracker.debian.org/tracker/CVE-2011-3374
 https://snyk.io/vuln/SNYK-LINUX-APT-116518
 https://ubuntu.com/security/CVE-2011-3374
 
 | 
  | libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 |  | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942https://linux.oracle.com/cve/CVE-2021-35942.html
 https://linux.oracle.com/errata/ELSA-2021-9560.html
 https://security.netapp.com/advisory/ntap-20210827-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28011
 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
 https://sourceware.org/glibc/wiki/Security%20Exceptions
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-bin | CVE-2020-1751 | HIGH | 2.28-10 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
 https://linux.oracle.com/cve/CVE-2020-1751.html
 https://linux.oracle.com/errata/ELSA-2020-4444.html
 https://security.gentoo.org/glsa/202006-04
 https://security.netapp.com/advisory/ntap-20200430-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25423
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc-bin | CVE-2020-1752 | HIGH | 2.28-10 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
 https://linux.oracle.com/cve/CVE-2020-1752.html
 https://linux.oracle.com/errata/ELSA-2020-4444.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://security.gentoo.org/glsa/202101-20
 https://security.netapp.com/advisory/ntap-20200511-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25414
 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc-bin | CVE-2021-3326 | HIGH | 2.28-10 |  | Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
 https://linux.oracle.com/cve/CVE-2021-3326.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210304-0007/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27256
 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
 https://ubuntu.com/security/notices/USN-5310-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libc-bin | CVE-2021-3999 | HIGH | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013https://linux.oracle.com/cve/CVE-2019-25013.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
 https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
 https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
 https://security.netapp.com/advisory/ntap-20210205-0004/
 https://sourceware.org/bugzilla/show_bug.cgi?id=24973
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
 https://linux.oracle.com/cve/CVE-2020-10029.html
 https://linux.oracle.com/errata/ELSA-2021-0348.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
 https://security.gentoo.org/glsa/202006-04
 https://security.netapp.com/advisory/ntap-20200327-0003/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25487
 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618https://linux.oracle.com/cve/CVE-2020-27618.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210401-0006/
 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
 https://ubuntu.com/security/notices/USN-5310-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-bin | CVE-2010-4756 | LOW | 2.28-10 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc-bin | CVE-2016-10228 | LOW | 2.28-10 |  | Expand...http://openwall.com/lists/oss-security/2017/03/01/10http://www.securityfocus.com/bid/96525
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
 https://linux.oracle.com/cve/CVE-2016-10228.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security.gentoo.org/glsa/202101-20
 https://sourceware.org/bugzilla/show_bug.cgi?id=19519
 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc-bin | CVE-2018-20796 | LOW | 2.28-10 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-bin | CVE-2019-1010022 | LOW | 2.28-10 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc-bin | CVE-2019-1010023 | LOW | 2.28-10 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc-bin | CVE-2019-1010024 | LOW | 2.28-10 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc-bin | CVE-2019-1010025 | LOW | 2.28-10 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc-bin | CVE-2019-19126 | LOW | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126https://linux.oracle.com/cve/CVE-2019-19126.html
 https://linux.oracle.com/errata/ELSA-2020-3861.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25204
 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc-bin | CVE-2019-9192 | LOW | 2.28-10 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-bin | CVE-2020-6096 | LOW | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
 https://security.gentoo.org/glsa/202101-20
 https://sourceware.org/bugzilla/attachment.cgi?id=12334
 https://sourceware.org/bugzilla/show_bug.cgi?id=25620
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
 https://ubuntu.com/security/notices/USN-4954-1
 https://ubuntu.com/security/notices/USN-5310-1
 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
 
 | 
  | libc-bin | CVE-2021-27645 | LOW | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645https://linux.oracle.com/cve/CVE-2021-27645.html
 https://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27462
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 |  | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942https://linux.oracle.com/cve/CVE-2021-35942.html
 https://linux.oracle.com/errata/ELSA-2021-9560.html
 https://security.netapp.com/advisory/ntap-20210827-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28011
 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
 https://sourceware.org/glibc/wiki/Security%20Exceptions
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6 | CVE-2020-1751 | HIGH | 2.28-10 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
 https://linux.oracle.com/cve/CVE-2020-1751.html
 https://linux.oracle.com/errata/ELSA-2020-4444.html
 https://security.gentoo.org/glsa/202006-04
 https://security.netapp.com/advisory/ntap-20200430-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25423
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc6 | CVE-2020-1752 | HIGH | 2.28-10 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
 https://linux.oracle.com/cve/CVE-2020-1752.html
 https://linux.oracle.com/errata/ELSA-2020-4444.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://security.gentoo.org/glsa/202101-20
 https://security.netapp.com/advisory/ntap-20200511-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25414
 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc6 | CVE-2021-3326 | HIGH | 2.28-10 |  | Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
 https://linux.oracle.com/cve/CVE-2021-3326.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210304-0007/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27256
 https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
 https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
 https://ubuntu.com/security/notices/USN-5310-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libc6 | CVE-2021-3999 | HIGH | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013https://linux.oracle.com/cve/CVE-2019-25013.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
 https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
 https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
 https://security.netapp.com/advisory/ntap-20210205-0004/
 https://sourceware.org/bugzilla/show_bug.cgi?id=24973
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
 https://linux.oracle.com/cve/CVE-2020-10029.html
 https://linux.oracle.com/errata/ELSA-2021-0348.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
 https://security.gentoo.org/glsa/202006-04
 https://security.netapp.com/advisory/ntap-20200327-0003/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25487
 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618https://linux.oracle.com/cve/CVE-2020-27618.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210401-0006/
 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
 https://ubuntu.com/security/notices/USN-5310-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6 | CVE-2010-4756 | LOW | 2.28-10 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc6 | CVE-2016-10228 | LOW | 2.28-10 |  | Expand...http://openwall.com/lists/oss-security/2017/03/01/10http://www.securityfocus.com/bid/96525
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
 https://linux.oracle.com/cve/CVE-2016-10228.html
 https://linux.oracle.com/errata/ELSA-2021-9344.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security.gentoo.org/glsa/202101-20
 https://sourceware.org/bugzilla/show_bug.cgi?id=19519
 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
 https://sourceware.org/bugzilla/show_bug.cgi?id=26224
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libc6 | CVE-2018-20796 | LOW | 2.28-10 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6 | CVE-2019-1010022 | LOW | 2.28-10 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc6 | CVE-2019-1010023 | LOW | 2.28-10 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc6 | CVE-2019-1010024 | LOW | 2.28-10 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc6 | CVE-2019-1010025 | LOW | 2.28-10 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc6 | CVE-2019-19126 | LOW | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126https://linux.oracle.com/cve/CVE-2019-19126.html
 https://linux.oracle.com/errata/ELSA-2020-3861.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
 https://sourceware.org/bugzilla/show_bug.cgi?id=25204
 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
 https://ubuntu.com/security/notices/USN-4416-1
 https://usn.ubuntu.com/4416-1/
 
 | 
  | libc6 | CVE-2019-9192 | LOW | 2.28-10 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6 | CVE-2020-6096 | LOW | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
 https://security.gentoo.org/glsa/202101-20
 https://sourceware.org/bugzilla/attachment.cgi?id=12334
 https://sourceware.org/bugzilla/show_bug.cgi?id=25620
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
 https://ubuntu.com/security/notices/USN-4954-1
 https://ubuntu.com/security/notices/USN-5310-1
 https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
 
 | 
  | libc6 | CVE-2021-27645 | LOW | 2.28-10 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645https://linux.oracle.com/cve/CVE-2021-27645.html
 https://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27462
 https://ubuntu.com/security/notices/USN-5310-1
 
 | 
  | libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22946.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22947.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22922.htmlhttps://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22923.htmlhttps://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 |  | Expand...https://curl.se/docs/CVE-2021-22924.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libde265-0 | CVE-2020-21598 | HIGH | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/237
 | 
  | libde265-0 | CVE-2021-36409 | HIGH | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/300
 | 
  | libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/233
 | 
  | libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/239
 | 
  | libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/236
 | 
  | libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/238
 | 
  | libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/235
 | 
  | libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/243
 | 
  | libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/241
 | 
  | libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/242
 | 
  | libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/240
 | 
  | libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/231
 | 
  | libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/234
 | 
  | libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/232
 | 
  | libde265-0 | CVE-2021-35452 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/298
 | 
  | libde265-0 | CVE-2021-36408 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/299
 | 
  | libde265-0 | CVE-2021-36410 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/301
 | 
  | libde265-0 | CVE-2021-36411 | MEDIUM | 1.0.3-1 |  | Expand...https://github.com/strukturag/libde265/issues/302
 | 
  | libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u3 |  | Expand...http://openwall.com/lists/oss-security/2013/02/22/3http://seclists.org/fulldisclosure/2021/Oct/61
 http://seclists.org/fulldisclosure/2021/Oct/62
 http://seclists.org/fulldisclosure/2021/Oct/63
 http://seclists.org/fulldisclosure/2021/Sep/33
 http://seclists.org/fulldisclosure/2021/Sep/34
 http://seclists.org/fulldisclosure/2021/Sep/35
 http://seclists.org/fulldisclosure/2021/Sep/38
 http://seclists.org/fulldisclosure/2021/Sep/39
 http://seclists.org/fulldisclosure/2021/Sep/40
 http://securitytracker.com/id?1028213
 http://www.openwall.com/lists/oss-security/2013/04/12/6
 http://www.openwall.com/lists/oss-security/2021/10/07/4
 http://www.osvdb.org/90634
 http://www.securityfocus.com/bid/58233
 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
 https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
 https://security.gentoo.org/glsa/201701-21
 https://support.apple.com/kb/HT212804
 https://support.apple.com/kb/HT212805
 https://support.apple.com/kb/HT212807
 https://support.apple.com/kb/HT212814
 https://support.apple.com/kb/HT212815
 https://support.apple.com/kb/HT212819
 
 | 
  | libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 |  | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markuphttps://www.gnu.org/software/gcc/gcc-8/changes.html
 
 | 
  | libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
 https://linux.oracle.com/cve/CVE-2019-15847.html
 https://linux.oracle.com/errata/ELSA-2020-1864.html
 
 | 
  | libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560https://dev.gnupg.org/T5305
 https://dev.gnupg.org/T5328
 https://dev.gnupg.org/T5466
 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
 https://eprint.iacr.org/2021/923
 https://linux.oracle.com/cve/CVE-2021-33560.html
 https://linux.oracle.com/errata/ELSA-2021-4409.html
 https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
 https://ubuntu.com/security/notices/USN-5080-1
 https://ubuntu.com/security/notices/USN-5080-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
 http://www.openwall.com/lists/oss-security/2019/10/02/2
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
 https://dev.gnupg.org/T4683
 https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
 https://linux.oracle.com/cve/CVE-2019-13627.html
 https://linux.oracle.com/errata/ELSA-2020-4482.html
 https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
 https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
 https://minerva.crocs.fi.muni.cz/
 https://security-tracker.debian.org/tracker/CVE-2019-13627
 https://security.gentoo.org/glsa/202003-32
 https://ubuntu.com/security/notices/USN-4236-1
 https://ubuntu.com/security/notices/USN-4236-2
 https://ubuntu.com/security/notices/USN-4236-3
 https://usn.ubuntu.com/4236-1/
 https://usn.ubuntu.com/4236-2/
 https://usn.ubuntu.com/4236-3/
 
 | 
  | libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 |  | Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamalhttps://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
 https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
 https://www.oracle.com/security-alerts/cpujan2020.html
 
 | 
  | libglib2.0-0 | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libglib2.0-0 | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 |  | Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5dhttps://gitlab.gnome.org/GNOME/glib/-/issues/2197
 https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
 
 | 
  | libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 |  | Expand...https://bugs.debian.org/994405https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
 https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
 https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
 
 | 
  | libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 |  | Expand... | 
  | libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 |  | Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
 http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
 http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
 http://curl.haxx.se/docs/adv_20120124B.html
 http://downloads.asterisk.org/pub/security/AST-2016-001.html
 http://ekoparty.org/2011/juliano-rizzo.php
 http://eprint.iacr.org/2004/111
 http://eprint.iacr.org/2006/136
 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
 http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
 http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
 http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
 http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
 http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
 http://marc.info/?l=bugtraq&m=132750579901589&w=2
 http://marc.info/?l=bugtraq&m=132872385320240&w=2
 http://marc.info/?l=bugtraq&m=133365109612558&w=2
 http://marc.info/?l=bugtraq&m=133728004526190&w=2
 http://marc.info/?l=bugtraq&m=134254866602253&w=2
 http://marc.info/?l=bugtraq&m=134254957702612&w=2
 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
 http://osvdb.org/74829
 http://rhn.redhat.com/errata/RHSA-2012-0508.html
 http://rhn.redhat.com/errata/RHSA-2013-1455.html
 http://secunia.com/advisories/45791
 http://secunia.com/advisories/47998
 http://secunia.com/advisories/48256
 http://secunia.com/advisories/48692
 http://secunia.com/advisories/48915
 http://secunia.com/advisories/48948
 http://secunia.com/advisories/49198
 http://secunia.com/advisories/55322
 http://secunia.com/advisories/55350
 http://secunia.com/advisories/55351
 http://security.gentoo.org/glsa/glsa-201203-02.xml
 http://security.gentoo.org/glsa/glsa-201406-32.xml
 http://support.apple.com/kb/HT4999
 http://support.apple.com/kb/HT5001
 http://support.apple.com/kb/HT5130
 http://support.apple.com/kb/HT5281
 http://support.apple.com/kb/HT5501
 http://support.apple.com/kb/HT6150
 http://technet.microsoft.com/security/advisory/2588513
 http://vnhacker.blogspot.com/2011/09/beast.html
 http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
 http://www.debian.org/security/2012/dsa-2398
 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
 http://www.ibm.com/developerworks/java/jdk/alerts/
 http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
 http://www.insecure.cl/Beast-SSL.rar
 http://www.kb.cert.org/vuls/id/864643
 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
 http://www.opera.com/docs/changelogs/mac/1151/
 http://www.opera.com/docs/changelogs/mac/1160/
 http://www.opera.com/docs/changelogs/unix/1151/
 http://www.opera.com/docs/changelogs/unix/1160/
 http://www.opera.com/docs/changelogs/windows/1151/
 http://www.opera.com/docs/changelogs/windows/1160/
 http://www.opera.com/support/kb/view/1004/
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
 http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
 http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
 http://www.redhat.com/support/errata/RHSA-2011-1384.html
 http://www.redhat.com/support/errata/RHSA-2012-0006.html
 http://www.securityfocus.com/bid/49388
 http://www.securityfocus.com/bid/49778
 http://www.securitytracker.com/id/1029190
 http://www.securitytracker.com/id?1025997
 http://www.securitytracker.com/id?1026103
 http://www.securitytracker.com/id?1026704
 http://www.ubuntu.com/usn/USN-1263-1
 http://www.us-cert.gov/cas/techalerts/TA12-010A.html
 https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
 https://bugzilla.novell.com/show_bug.cgi?id=719047
 https://bugzilla.redhat.com/show_bug.cgi?id=737506
 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
 https://hermes.opensuse.org/messages/13154861
 https://hermes.opensuse.org/messages/13155432
 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
 https://linux.oracle.com/cve/CVE-2011-3389.html
 https://linux.oracle.com/errata/ELSA-2011-1380.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
 https://ubuntu.com/security/notices/USN-1263-1
 
 | 
  | libgomp1 | CVE-2018-12886 | HIGH | 8.3.0-6 |  | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markuphttps://www.gnu.org/software/gcc/gcc-8/changes.html
 
 | 
  | libgomp1 | CVE-2019-15847 | HIGH | 8.3.0-6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
 https://linux.oracle.com/cve/CVE-2019-15847.html
 https://linux.oracle.com/errata/ELSA-2020-1864.html
 
 | 
  | libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libheif1 | CVE-2020-19498 | HIGH | 1.3.2-2~deb10u1 |  | Expand...https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58https://github.com/strukturag/libheif/issues/139
 
 | 
  | libheif1 | CVE-2020-19499 | HIGH | 1.3.2-2~deb10u1 |  | Expand...https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1ddhttps://github.com/strukturag/libheif/issues/138
 
 | 
  | libheif1 | CVE-2020-23109 | HIGH | 1.3.2-2~deb10u1 |  | Expand...https://github.com/strukturag/libheif/issues/207
 | 
  | libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
 https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
 https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
 https://gitlab.com/libidn/libidn2/merge_requests/71
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
 https://security.gentoo.org/glsa/202003-63
 https://ubuntu.com/security/notices/USN-4168-1
 https://usn.ubuntu.com/4168-1/
 
 | 
  | libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707http://www.securityfocus.com/bid/99304
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libjpeg62-turbo | CVE-2017-15232 | LOW | 1:1.5.2-2+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
 https://github.com/mozilla/mozjpeg/issues/268
 https://ubuntu.com/security/notices/USN-3706-1
 https://usn.ubuntu.com/3706-1/
 
 | 
  | libjpeg62-turbo | CVE-2018-11813 | LOW | 1:1.5.2-2+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
 http://www.ijg.org/files/jpegsrc.v9d.tar.gz
 https://access.redhat.com/errata/RHSA-2019:2052
 https://bugs.gentoo.org/727908
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
 https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
 https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
 https://linux.oracle.com/cve/CVE-2018-11813.html
 https://linux.oracle.com/errata/ELSA-2019-2052.html
 
 | 
  | libjpeg62-turbo | CVE-2020-17541 | LOW | 1:1.5.2-2+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
 https://linux.oracle.com/cve/CVE-2020-17541.html
 https://linux.oracle.com/errata/ELSA-2021-4288.html
 
 | 
  | libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 http://www.securitytracker.com/id/1034221
 https://bugzilla.redhat.com/show_bug.cgi?id=1238322
 https://linux.oracle.com/cve/CVE-2015-3276.html
 https://linux.oracle.com/errata/ELSA-2015-2131.html
 
 | 
  | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://www.openldap.org/its/index.cgi?findid=8703
 | 
  | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
 http://www.openldap.org/its/index.cgi/Incoming?id=8759
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
 https://access.redhat.com/errata/RHBA-2019:3674
 https://bugs.openldap.org/show_bug.cgi?id=9266
 https://bugzilla.redhat.com/show_bug.cgi?id=1740070
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 http://www.securitytracker.com/id/1034221
 https://bugzilla.redhat.com/show_bug.cgi?id=1238322
 https://linux.oracle.com/cve/CVE-2015-3276.html
 https://linux.oracle.com/errata/ELSA-2015-2131.html
 
 | 
  | libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://www.openldap.org/its/index.cgi?findid=8703
 | 
  | libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
 http://www.openldap.org/its/index.cgi/Incoming?id=8759
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
 https://access.redhat.com/errata/RHBA-2019:3674
 https://bugs.openldap.org/show_bug.cgi?id=9266
 https://bugzilla.redhat.com/show_bug.cgi?id=1740070
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
 https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
 https://github.com/lz4/lz4/issues/801
 https://github.com/lz4/lz4/pull/756
 https://github.com/lz4/lz4/pull/760
 https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
 https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
 https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
 https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
 https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
 https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
 https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
 https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
 https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpuoct2020.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-19667 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667https://github.com/ImageMagick/ImageMagick/issues/1895
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27752 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894226https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27766 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-29599 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599https://github.com/ImageMagick/ImageMagick/discussions/2851
 https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
 https://linux.oracle.com/cve/CVE-2020-29599.html
 https://linux.oracle.com/errata/ELSA-2021-0024.html
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://security.gentoo.org/glsa/202101-36
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891605https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-25665 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-25674 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-25676 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891934https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27750 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891984https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27756 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894233https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27760 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894239https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27762 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894680https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27770 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20176 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1916610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-3596 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970569https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
 https://github.com/ImageMagick/ImageMagick/issues/2624
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6.q16-6 | CVE-2019-13310 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
 https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
 https://github.com/ImageMagick/ImageMagick/issues/1616
 https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
 https://linux.oracle.com/cve/CVE-2019-13310.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4192-1
 https://usn.ubuntu.com/4192-1/
 
 | 
  | libmagickcore-6.q16-6 | CVE-2019-16709 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
 http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
 https://github.com/ImageMagick/ImageMagick/issues/1531
 https://linux.oracle.com/cve/CVE-2019-16709.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4192-1
 https://usn.ubuntu.com/4192-1/
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-10251 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/1859
 | 
  | libmagickcore-6.q16-6 | CVE-2020-25666 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-25675 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891933https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27560 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560
 https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4670-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27751 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891994https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27753 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894229https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894231https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27757 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894234https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27758 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894236https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27759 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894238https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27761 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894679https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27763 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894682https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27764 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5https://bugzilla.redhat.com/show_bug.cgi?id=1894683
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
 https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27765 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894684https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27767 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27768 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27769 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
 https://github.com/ImageMagick/ImageMagick/issues/1740
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27771 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898290https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27772 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898291https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27773 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898295https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27774 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898296https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27775 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898300https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2020-27776 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickwand-6.q16-6 | CVE-2020-19667 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667https://github.com/ImageMagick/ImageMagick/issues/1895
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27752 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894226https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27766 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-29599 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599https://github.com/ImageMagick/ImageMagick/discussions/2851
 https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
 https://linux.oracle.com/cve/CVE-2020-29599.html
 https://linux.oracle.com/errata/ELSA-2021-0024.html
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://security.gentoo.org/glsa/202101-36
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891605https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-25665 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-25674 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-25676 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891934https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27750 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891984https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27756 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894233https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27760 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894239https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27762 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894680https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27770 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20176 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1916610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20176
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-3596 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970569https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
 https://github.com/ImageMagick/ImageMagick/issues/2624
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickwand-6.q16-6 | CVE-2019-13310 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310
 https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
 https://github.com/ImageMagick/ImageMagick/issues/1616
 https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
 https://linux.oracle.com/cve/CVE-2019-13310.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4192-1
 https://usn.ubuntu.com/4192-1/
 
 | 
  | libmagickwand-6.q16-6 | CVE-2019-16709 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html
 http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709
 https://github.com/ImageMagick/ImageMagick/issues/1531
 https://linux.oracle.com/cve/CVE-2019-16709.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4192-1
 https://usn.ubuntu.com/4192-1/
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-10251 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/1859
 | 
  | libmagickwand-6.q16-6 | CVE-2020-25666 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-25675 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891933https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27560 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560
 https://github.com/ImageMagick/ImageMagick/commit/ef59bd764f88d893f1219fee8ba696a5d3f8c1c4
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4670-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27751 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1891994https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27753 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894229https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27754 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894231https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27755 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27757 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894234https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27758 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894236https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27759 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894238https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27761 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894679https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27763 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894682https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27764 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5https://bugzilla.redhat.com/show_bug.cgi?id=1894683
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
 https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27765 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894684https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27767 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27768 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27769 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1894690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
 https://github.com/ImageMagick/ImageMagick/issues/1740
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27771 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898290https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27772 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898291https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27773 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898295https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773
 https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27774 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898296https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27775 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898300https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2020-27776 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1898304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
 https://ubuntu.com/security/notices/USN-4988-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.10.23+dfsg-2.1+deb10u1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.htmlhttps://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
 https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
 https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
 https://linux.oracle.com/cve/CVE-2020-11080.html
 https://linux.oracle.com/errata/ELSA-2020-5765.html
 https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
 https://www.debian.org/security/2020/dsa-4696
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2021.html
 https://www.oracle.com/security-alerts/cpujul2020.html
 https://www.oracle.com/security-alerts/cpuoct2020.html
 
 | 
  | libonig5 | CVE-2019-13224 | LOW | 6.9.1-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
 https://linux.oracle.com/cve/CVE-2019-13224.html
 https://linux.oracle.com/errata/ELSA-2020-5861.html
 https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/
 https://security.gentoo.org/glsa/201911-03
 https://support.f5.com/csp/article/K00103182
 https://support.f5.com/csp/article/K00103182?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/notices/USN-4088-1
 https://usn.ubuntu.com/4088-1/
 
 | 
  | libonig5 | CVE-2019-13225 | LOW | 6.9.1-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c
 https://linux.oracle.com/cve/CVE-2019-13225.html
 https://linux.oracle.com/errata/ELSA-2020-5861.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/
 https://security.gentoo.org/glsa/201911-03
 
 | 
  | libonig5 | CVE-2019-16163 | LOW | 6.9.1-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16163https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180
 https://github.com/kkos/oniguruma/compare/v6.9.2...v6.9.3
 https://github.com/kkos/oniguruma/issues/147
 https://linux.oracle.com/cve/CVE-2019-16163.html
 https://linux.oracle.com/errata/ELSA-2020-3662.html
 https://lists.debian.org/debian-lts-announce/2019/09/msg00010.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWOWZZNFSAWM3BUTQNAE3PD44A6JU4KE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW47MSFZ6WYOAOFXHBDGU4LYACFRKC2Y/
 https://ubuntu.com/security/notices/USN-4460-1
 https://usn.ubuntu.com/4460-1/
 
 | 
  | libonig5 | CVE-2019-19012 | LOW | 6.9.1-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19012https://github.com/kkos/oniguruma/issues/164
 https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
 https://github.com/tarantula-team/CVE-2019-19012
 https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
 https://ubuntu.com/security/notices/USN-4460-1
 https://usn.ubuntu.com/4460-1/
 
 | 
  | libonig5 | CVE-2019-19203 | LOW | 6.9.1-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19203https://github.com/ManhNDd/CVE-2019-19203
 https://github.com/kkos/oniguruma/issues/163
 https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
 https://github.com/tarantula-team/CVE-2019-19203
 https://linux.oracle.com/cve/CVE-2019-19203.html
 https://linux.oracle.com/errata/ELSA-2020-3662.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
 
 | 
  | libonig5 | CVE-2019-19204 | LOW | 6.9.1-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204https://github.com/ManhNDd/CVE-2019-19204
 https://github.com/kkos/oniguruma/issues/162
 https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
 https://github.com/tarantula-team/CVE-2019-19204
 https://linux.oracle.com/cve/CVE-2019-19204.html
 https://linux.oracle.com/errata/ELSA-2020-3662.html
 https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
 https://ubuntu.com/security/notices/USN-4460-1
 https://usn.ubuntu.com/4460-1/
 
 | 
  | libonig5 | CVE-2019-19246 | LOW | 6.9.1-1 |  | Expand...https://bugs.php.net/bug.php?id=78559https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19246
 https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b
 https://linux.oracle.com/cve/CVE-2019-19246.html
 https://linux.oracle.com/errata/ELSA-2020-3662.html
 https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
 https://ubuntu.com/security/notices/USN-4460-1
 https://usn.ubuntu.com/4460-1/
 
 | 
  | libopenjp2-7 | CVE-2021-3575 | HIGH | 2.3.0-2+deb10u2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
 https://github.com/uclouvain/openjpeg/issues/1347
 https://linux.oracle.com/cve/CVE-2021-3575.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://ubuntu.com/security/CVE-2021-3575
 
 | 
  | libopenjp2-7 | CVE-2019-12973 | MEDIUM | 2.3.0-2+deb10u2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
 http://www.securityfocus.com/bid/108900
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973
 https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3
 https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503
 https://linux.oracle.com/cve/CVE-2019-12973.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html
 https://security.gentoo.org/glsa/202101-29
 https://www.oracle.com/security-alerts/cpujul2020.html
 
 | 
  | libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.3.0-2+deb10u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338https://github.com/uclouvain/openjpeg/issues/1338
 https://github.com/uclouvain/openjpeg/pull/1346
 https://github.com/uclouvain/openjpeg/pull/1395
 https://github.com/uclouvain/openjpeg/pull/1396
 https://github.com/uclouvain/openjpeg/pull/1397
 https://github.com/uclouvain/openjpeg/pull/1398
 https://linux.oracle.com/cve/CVE-2021-29338.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
 
 | 
  | libopenjp2-7 | CVE-2016-10505 | LOW | 2.3.0-2+deb10u2 |  | Expand...https://github.com/uclouvain/openjpeg/issues/776https://github.com/uclouvain/openjpeg/issues/784
 https://github.com/uclouvain/openjpeg/issues/785
 https://github.com/uclouvain/openjpeg/issues/792
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-10506 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/100573https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
 https://github.com/uclouvain/openjpeg/issues/731
 https://github.com/uclouvain/openjpeg/issues/732
 https://github.com/uclouvain/openjpeg/issues/777
 https://github.com/uclouvain/openjpeg/issues/778
 https://github.com/uclouvain/openjpeg/issues/779
 https://github.com/uclouvain/openjpeg/issues/780
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9113 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/93980https://github.com/uclouvain/openjpeg/issues/856
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9114 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/93979https://github.com/uclouvain/openjpeg/issues/857
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9115 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/93977https://github.com/uclouvain/openjpeg/issues/858
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9116 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/93975https://github.com/uclouvain/openjpeg/issues/859
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9117 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/93783https://github.com/uclouvain/openjpeg/issues/860
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9580 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/871
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9581 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/872
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2017-17479 | LOW | 2.3.0-2+deb10u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479https://github.com/uclouvain/openjpeg/issues/1044
 
 | 
  | libopenjp2-7 | CVE-2018-16375 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/105266https://github.com/uclouvain/openjpeg/issues/1126
 
 | 
  | libopenjp2-7 | CVE-2018-16376 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/105262https://github.com/uclouvain/openjpeg/issues/1127
 
 | 
  | libopenjp2-7 | CVE-2018-20845 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/108921https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
 https://linux.oracle.com/cve/CVE-2018-20845.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 
 | 
  | libopenjp2-7 | CVE-2018-20846 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/108921https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
 
 | 
  | libopenjp2-7 | CVE-2018-5727 | LOW | 2.3.0-2+deb10u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727https://github.com/uclouvain/openjpeg/issues/1053
 https://linux.oracle.com/cve/CVE-2018-5727.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://ubuntu.com/security/notices/USN-4686-1
 
 | 
  | libopenjp2-7 | CVE-2018-7648 | LOW | 2.3.0-2+deb10u2 |  | Expand...https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8dhttps://github.com/uclouvain/openjpeg/issues/1088
 
 | 
  | libopenjp2-7 | CVE-2019-6988 | LOW | 2.3.0-2+deb10u2 |  | Expand...http://www.securityfocus.com/bid/106785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
 https://github.com/uclouvain/openjpeg/issues/1178
 
 | 
  | libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
 https://linux.oracle.com/cve/CVE-2020-14155.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libpng16-16 | CVE-2018-14048 | LOW | 1.6.36-6 |  | Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
 https://github.com/fouzhe/security/tree/master/libpng
 https://github.com/glennrp/libpng/issues/238
 https://seclists.org/bugtraq/2019/Apr/30
 https://security.gentoo.org/glsa/201908-02
 
 | 
  | libpng16-16 | CVE-2018-14550 | LOW | 1.6.36-6 |  | Expand...https://github.com/advisories/GHSA-qwwr-qc2p-6283https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
 https://github.com/glennrp/libpng/issues/246
 https://nvd.nist.gov/vuln/detail/CVE-2018-14550
 https://security.gentoo.org/glsa/201908-02
 https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
 https://www.oracle.com/security-alerts/cpuApr2021.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpng16-16 | CVE-2019-6129 | LOW | 1.6.36-6 |  | Expand...https://github.com/glennrp/libpng/issues/269https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
 
 | 
  | libpng16-16 | CVE-2021-4214 | LOW | 1.6.36-6 |  | Expand... | 
  | libpq5 | CVE-2019-9193 | LOW | 11.14-0+deb10u1 |  | Expand...http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.htmlhttps://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/
 https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
 https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/
 https://security.netapp.com/advisory/ntap-20190502-0003/
 https://www.postgresql.org/about/news/1935/
 https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/
 
 | 
  | libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
 http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
 https://access.redhat.com/errata/RHSA-2019:3624
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
 https://github.com/seccomp/libseccomp/issues/139
 https://linux.oracle.com/cve/CVE-2019-9893.html
 https://linux.oracle.com/errata/ELSA-2019-3624.html
 https://seclists.org/oss-sec/2019/q1/179
 https://security.gentoo.org/glsa/201904-18
 https://ubuntu.com/security/notices/USN-4001-1
 https://ubuntu.com/security/notices/USN-4001-2
 https://usn.ubuntu.com/4001-1/
 https://usn.ubuntu.com/4001-2/
 https://www.openwall.com/lists/oss-security/2019/03/15/1
 
 | 
  | libsepol1 | CVE-2021-36084 | LOW | 2.8-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
 https://linux.oracle.com/cve/CVE-2021-36084.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36085 | LOW | 2.8-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
 https://linux.oracle.com/cve/CVE-2021-36085.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36086 | LOW | 2.8-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
 https://linux.oracle.com/cve/CVE-2021-36086.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36087 | LOW | 2.8-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
 https://linux.oracle.com/cve/CVE-2021-36087.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
 
 | 
  | libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
 https://linux.oracle.com/cve/CVE-2019-19603.html
 https://linux.oracle.com/errata/ELSA-2021-4396.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://security.netapp.com/advisory/ntap-20191223-0001/
 https://ubuntu.com/security/notices/USN-4394-1
 https://usn.ubuntu.com/4394-1/
 https://www.oracle.com/security-alerts/cpuapr2020.html
 https://www.sqlite.org/
 
 | 
  | libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
 https://security.netapp.com/advisory/ntap-20191223-0001/
 https://ubuntu.com/security/notices/USN-4394-1
 https://usn.ubuntu.com/4394-1/
 https://www.oracle.com/security-alerts/cpuapr2020.html
 
 | 
  | libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
 https://linux.oracle.com/cve/CVE-2019-19924.html
 https://linux.oracle.com/errata/ELSA-2020-1810.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://security.netapp.com/advisory/ntap-20200114-0003/
 https://ubuntu.com/security/notices/USN-4298-1
 https://usn.ubuntu.com/4298-1/
 https://www.oracle.com/security-alerts/cpuapr2020.html
 
 | 
  | libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2020/Nov/19
 http://seclists.org/fulldisclosure/2020/Nov/20
 http://seclists.org/fulldisclosure/2020/Nov/22
 https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
 https://linux.oracle.com/cve/CVE-2020-13631.html
 https://linux.oracle.com/errata/ELSA-2020-4442.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
 https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
 https://security.gentoo.org/glsa/202007-26
 https://security.netapp.com/advisory/ntap-20200608-0002/
 https://sqlite.org/src/info/eca0ba2cf4c0fdf7
 https://support.apple.com/kb/HT211843
 https://support.apple.com/kb/HT211844
 https://support.apple.com/kb/HT211850
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT211935
 https://support.apple.com/kb/HT211952
 https://ubuntu.com/security/notices/USN-4394-1
 https://usn.ubuntu.com/4394-1/
 https://www.oracle.com/security-alerts/cpujul2020.html
 https://www.oracle.com/security-alerts/cpuoct2020.html
 
 | 
  | libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 |  | Expand...https://github.com/guyinatuxedo/sqlite3_record_leakinghttps://security.netapp.com/advisory/ntap-20220303-0001/
 
 | 
  | libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
 https://ubuntu.com/security/notices/USN-4205-1
 https://usn.ubuntu.com/4205-1/
 https://www.oracle.com/security-alerts/cpuapr2020.html
 
 | 
  | libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 |  | Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.aschttps://security.gentoo.org/glsa/202007-26
 https://security.netapp.com/advisory/ntap-20200416-0001/
 https://www.oracle.com/security-alerts/cpuApr2021.html
 https://www.oracle.com/security-alerts/cpujan2021.html
 https://www.oracle.com/security-alerts/cpujul2020.html
 https://www.oracle.com/security-alerts/cpuoct2020.html
 https://www.sqlite.org/src/info/d09f8c3621d5f7f8
 https://www3.sqlite.org/cgi/src/info/b64674919f673602
 
 | 
  | libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.sqlite.org/forum/forumpost/718c0a8d17
 
 | 
  | libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 |  | Expand...https://blog.semmle.com/libssh2-integer-overflow/https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
 https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
 https://github.com/libssh2/libssh2/pull/350
 https://libssh2.org/changes.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
 https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
 https://security.netapp.com/advisory/ntap-20190806-0002/
 https://support.f5.com/csp/article/K13322484
 https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
 
 | 
  | libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.htmlhttps://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
 https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
 https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
 https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
 https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
 https://linux.oracle.com/cve/CVE-2019-17498.html
 https://linux.oracle.com/errata/ELSA-2020-3915.html
 https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
 https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
 
 | 
  | libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 |  | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 |  | Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markuphttps://www.gnu.org/software/gcc/gcc-8/changes.html
 
 | 
  | libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
 https://linux.oracle.com/cve/CVE-2019-15847.html
 https://linux.oracle.com/errata/ELSA-2020-1864.html
 
 | 
  | libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 |  | Expand...http://www.securityfocus.com/bid/108116https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
 https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
 https://linux.oracle.com/cve/CVE-2019-3843.html
 https://linux.oracle.com/errata/ELSA-2020-1794.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
 https://security.netapp.com/advisory/ntap-20190619-0002/
 https://ubuntu.com/security/notices/USN-4269-1
 https://usn.ubuntu.com/4269-1/
 
 | 
  | libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 |  | Expand...http://www.securityfocus.com/bid/108096https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
 https://linux.oracle.com/cve/CVE-2019-3844.html
 https://linux.oracle.com/errata/ELSA-2020-1794.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://security.netapp.com/advisory/ntap-20190619-0002/
 https://ubuntu.com/security/notices/USN-4269-1
 https://usn.ubuntu.com/4269-1/
 
 | 
  | libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997https://ubuntu.com/security/notices/USN-5226-1
 https://www.openwall.com/lists/oss-security/2022/01/10/2
 
 | 
  | libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357http://www.openwall.com/lists/oss-security/2013/10/01/9
 https://bugzilla.redhat.com/show_bug.cgi?id=859060
 
 | 
  | libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
 https://linux.oracle.com/cve/CVE-2019-20386.html
 https://linux.oracle.com/errata/ELSA-2020-4553.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
 https://security.netapp.com/advisory/ntap-20200210-0002/
 https://ubuntu.com/security/notices/USN-4269-1
 https://usn.ubuntu.com/4269-1/
 
 | 
  | libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 |  | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2http://www.openwall.com/lists/oss-security/2021/08/17/3
 http://www.openwall.com/lists/oss-security/2021/09/07/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
 https://linux.oracle.com/cve/CVE-2020-13529.html
 https://linux.oracle.com/errata/ELSA-2021-4361.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
 https://security.gentoo.org/glsa/202107-48
 https://security.netapp.com/advisory/ntap-20210625-0005/
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
 https://ubuntu.com/security/notices/USN-5013-1
 https://ubuntu.com/security/notices/USN-5013-2
 
 | 
  | libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 |  | Expand...https://github.com/systemd/systemd/issues/15985https://linux.oracle.com/cve/CVE-2020-13776.html
 https://linux.oracle.com/errata/ELSA-2021-1611.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
 https://security.netapp.com/advisory/ntap-20200611-0003/
 
 | 
  | libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
 http://www.securityfocus.com/bid/105151
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
 https://gitlab.com/gnutls/libtasn1/issues/4
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libtiff5 | CVE-2022-0561 | MEDIUM | 4.1.0+git191117-2~deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 
 | 
  | libtiff5 | CVE-2022-0562 | MEDIUM | 4.1.0+git191117-2~deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 
 | 
  | libtiff5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2~deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
 https://gitlab.com/libtiff/libtiff/-/issues/385
 https://gitlab.com/libtiff/libtiff/-/merge_requests/306
 
 | 
  | libtiff5 | CVE-2022-22844 | MEDIUM | 4.1.0+git191117-2~deb10u3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844https://gitlab.com/libtiff/libtiff/-/issues/355
 https://gitlab.com/libtiff/libtiff/-/merge_requests/287
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 
 | 
  | libtiff5 | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
 http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
 http://openwall.com/lists/oss-security/2015/01/24/15
 http://rhn.redhat.com/errata/RHSA-2016-1546.html
 http://rhn.redhat.com/errata/RHSA-2016-1547.html
 http://support.apple.com/kb/HT204941
 http://support.apple.com/kb/HT204942
 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
 http://www.securityfocus.com/bid/72353
 http://www.securitytracker.com/id/1032760
 https://bugzilla.redhat.com/show_bug.cgi?id=1185817
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
 https://linux.oracle.com/cve/CVE-2014-8130.html
 https://linux.oracle.com/errata/ELSA-2016-1547.html
 https://security.gentoo.org/glsa/201701-16
 https://ubuntu.com/security/notices/USN-2553-1
 
 | 
  | libtiff5 | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
 http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
 http://seclists.org/fulldisclosure/2018/Dec/32
 http://seclists.org/fulldisclosure/2018/Dec/47
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101696
 
 | 
  | libtiff5 | CVE-2017-17973 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769http://www.securityfocus.com/bid/102331
 https://bugzilla.novell.com/show_bug.cgi?id=1074318
 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
 
 | 
  | libtiff5 | CVE-2017-5563 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664http://www.securityfocus.com/bid/95705
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
 https://security.gentoo.org/glsa/201709-27
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff5 | CVE-2017-9117 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690http://www.securityfocus.com/bid/98581
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libtiff5 | CVE-2020-35521 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034https://linux.oracle.com/cve/CVE-2020-35521.html
 https://linux.oracle.com/errata/ELSA-2021-4241.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
 https://security.gentoo.org/glsa/202104-06
 https://security.netapp.com/advisory/ntap-20210521-0009/
 
 | 
  | libtiff5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2~deb10u3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
 https://gitlab.com/libtiff/libtiff/-/merge_requests/165
 https://linux.oracle.com/cve/CVE-2020-35522.html
 https://linux.oracle.com/errata/ELSA-2021-4241.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
 https://security.gentoo.org/glsa/202104-06
 https://security.netapp.com/advisory/ntap-20210521-0009/
 
 | 
  | libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 |  | Expand...http://www.securityfocus.com/bid/108116https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
 https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
 https://linux.oracle.com/cve/CVE-2019-3843.html
 https://linux.oracle.com/errata/ELSA-2020-1794.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
 https://security.netapp.com/advisory/ntap-20190619-0002/
 https://ubuntu.com/security/notices/USN-4269-1
 https://usn.ubuntu.com/4269-1/
 
 | 
  | libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 |  | Expand...http://www.securityfocus.com/bid/108096https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
 https://linux.oracle.com/cve/CVE-2019-3844.html
 https://linux.oracle.com/errata/ELSA-2020-1794.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://security.netapp.com/advisory/ntap-20190619-0002/
 https://ubuntu.com/security/notices/USN-4269-1
 https://usn.ubuntu.com/4269-1/
 
 | 
  | libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997https://ubuntu.com/security/notices/USN-5226-1
 https://www.openwall.com/lists/oss-security/2022/01/10/2
 
 | 
  | libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357http://www.openwall.com/lists/oss-security/2013/10/01/9
 https://bugzilla.redhat.com/show_bug.cgi?id=859060
 
 | 
  | libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
 https://linux.oracle.com/cve/CVE-2019-20386.html
 https://linux.oracle.com/errata/ELSA-2020-4553.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
 https://security.netapp.com/advisory/ntap-20200210-0002/
 https://ubuntu.com/security/notices/USN-4269-1
 https://usn.ubuntu.com/4269-1/
 
 | 
  | libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 |  | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2http://www.openwall.com/lists/oss-security/2021/08/17/3
 http://www.openwall.com/lists/oss-security/2021/09/07/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
 https://linux.oracle.com/cve/CVE-2020-13529.html
 https://linux.oracle.com/errata/ELSA-2021-4361.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
 https://security.gentoo.org/glsa/202107-48
 https://security.netapp.com/advisory/ntap-20210625-0005/
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
 https://ubuntu.com/security/notices/USN-5013-1
 https://ubuntu.com/security/notices/USN-5013-2
 
 | 
  | libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 |  | Expand...https://github.com/systemd/systemd/issues/15985https://linux.oracle.com/cve/CVE-2020-13776.html
 https://linux.oracle.com/errata/ELSA-2021-1611.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
 https://security.netapp.com/advisory/ntap-20200611-0003/
 
 | 
  | libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 |  | Expand...http://xmlsoft.org/news.htmlhttps://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
 https://bugzilla.gnome.org/show_bug.cgi?id=759579
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
 https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
 https://github.com/sparklemotion/nokogiri/issues/1714
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
 https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
 https://ubuntu.com/security/notices/USN-3504-1
 https://ubuntu.com/security/notices/USN-3504-2
 https://ubuntu.com/security/notices/USN-3739-1
 https://usn.ubuntu.com/3739-1/
 https://usn.ubuntu.com/usn/usn-3504-1/
 
 | 
  | libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 |  | Expand...https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340ehttps://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
 
 | 
  | libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 |  | Expand...http://www.securityfocus.com/bid/94347https://bugzilla.gnome.org/show_bug.cgi?id=772726
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
 https://github.com/lsh123/xmlsec/issues/43
 https://security.gentoo.org/glsa/201711-01
 https://ubuntu.com/security/notices/USN-3739-1
 https://ubuntu.com/security/notices/USN-3739-2
 https://usn.ubuntu.com/3739-1/
 https://usn.ubuntu.com/3739-2/
 
 | 
  | libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 |  | Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400https://bugzilla.suse.com/show_bug.cgi?id=934119
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
 
 | 
  | login | CVE-2007-5686 | LOW | 1:4.5-1.1 |  | Expand...http://secunia.com/advisories/27215http://www.securityfocus.com/archive/1/482129/100/100/threaded
 http://www.securityfocus.com/archive/1/482857/100/0/threaded
 http://www.securityfocus.com/bid/26048
 http://www.vupen.com/english/advisories/2007/3474
 https://issues.rpath.com/browse/RPL-1825
 
 | 
  | login | CVE-2013-4235 | LOW | 1:4.5-1.1 |  | Expand...https://access.redhat.com/security/cve/cve-2013-4235https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security-tracker.debian.org/tracker/CVE-2013-4235
 
 | 
  | login | CVE-2018-7169 | LOW | 1:4.5-1.1 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
 https://github.com/shadow-maint/shadow/pull/97
 https://security.gentoo.org/glsa/201805-09
 https://ubuntu.com/security/notices/USN-5254-1
 
 | 
  | login | CVE-2019-19882 | LOW | 1:4.5-1.1 |  | Expand...https://bugs.archlinux.org/task/64836https://bugs.gentoo.org/702252
 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
 https://github.com/shadow-maint/shadow/pull/199
 https://github.com/void-linux/void-packages/pull/17580
 https://security.gentoo.org/glsa/202008-09
 
 | 
  | mount | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | mount | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 |  | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 |  | Expand...http://secunia.com/advisories/27215http://www.securityfocus.com/archive/1/482129/100/100/threaded
 http://www.securityfocus.com/archive/1/482857/100/0/threaded
 http://www.securityfocus.com/bid/26048
 http://www.vupen.com/english/advisories/2007/3474
 https://issues.rpath.com/browse/RPL-1825
 
 | 
  | passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 |  | Expand...https://access.redhat.com/security/cve/cve-2013-4235https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security-tracker.debian.org/tracker/CVE-2013-4235
 
 | 
  | passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
 https://github.com/shadow-maint/shadow/pull/97
 https://security.gentoo.org/glsa/201805-09
 https://ubuntu.com/security/notices/USN-5254-1
 
 | 
  | passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 |  | Expand...https://bugs.archlinux.org/task/64836https://bugs.gentoo.org/702252
 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
 https://github.com/shadow-maint/shadow/pull/199
 https://github.com/void-linux/void-packages/pull/17580
 https://security.gentoo.org/glsa/202008-09
 
 | 
  | perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 |  | Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 
 | 
  | tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 |  | Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
 http://savannah.gnu.org/bugs/?55369
 https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://ubuntu.com/security/notices/USN-4692-1
 
 | 
  | tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
 https://savannah.gnu.org/bugs/?59897
 https://security.gentoo.org/glsa/202105-29
 
 | 
  | util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 |  | Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1chttps://github.com/karelzak/util-linux/issues/1395
 https://security.netapp.com/advisory/ntap-20210902-0002/
 
 | 
  | util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 |